0% found this document useful (0 votes)
175 views55 pages

Chuks Project Work

The document provides an introduction to the National Identity Card Processing and Administration system in Nigeria. It discusses the background of national identity cards, stating that they are important for determining population figures and allowing individuals to be identified in a given location. It then outlines the history of efforts to implement a national ID system in Nigeria dating back to 1977. Key organizations involved include the Department of National Civic Registration, National Identity Management Commission, and National Identity Management and Harmonization Committee. The document concludes by stating the objectives of the study, which are to design an automated national identity card management system to address issues with the current manual paper-based system.

Uploaded by

Divine Jasper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views55 pages

Chuks Project Work

The document provides an introduction to the National Identity Card Processing and Administration system in Nigeria. It discusses the background of national identity cards, stating that they are important for determining population figures and allowing individuals to be identified in a given location. It then outlines the history of efforts to implement a national ID system in Nigeria dating back to 1977. Key organizations involved include the Department of National Civic Registration, National Identity Management Commission, and National Identity Management and Harmonization Committee. The document concludes by stating the objectives of the study, which are to design an automated national identity card management system to address issues with the current manual paper-based system.

Uploaded by

Divine Jasper
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 55

CHAPTER 1

INTRODUCTION

1.1 BACKGROUND OF THE STUDY

The National Identity Card Processing and Administration system is the only true way a state

and a nation’s population figure can be ascertain. To be accepted in a given location or

geographical area, it is necessary to bear a mark. Mark here does not really mean facial mark

rather an identity. This identity card will bear your name, state and all information about you as

an individual or person. This therefore boils down to what we know as National Identity Card.

The Question is “what is an identity card? As defined by many authors and dictionary including

the encyclopedia. It is a national document certifying State, nationality, issued by the

government of a country to every individual or person that the definition National Identity Card

can also be called a true image of an individual or person; because it tells well abut a person.”

The idea of a national identification card system in Nigeria was originally conceived in 1977 but

was eventually executed in 2003 after several controversies and bottlenecks (Obi, 2006). In 1978

under the Department of National Civic Registration (DNCR), which was charged with

registering and issuing a National Identity Card to every citizen of Nigeria who was then 18

years or older, an attempt was initiated to document the identity of Nigerians and non-citizens

using biographic data. The aim of this scheme then as stated in the National Identity

Management System Handbook on Business Processes, Standards and Specifications (2011) was

to use the program as an effective tool for controlling illegal immigration, to validate other civic

documents like travel passports, and to set up a reliable personal identification system for

securing commercial transactions with financial institutions and the like.

1
In 2007, National Identity Management Commission (NIMC), established by the NIMC Act No.

23 of 2007, was given the mandate to establish, own, operate, maintain and manage the National

Identity Database in Nigeria. A key requirement of the National Identity Management System

(NIMS) is the capture of biometrics and necessary demographic data in a standardized manner

that would facilitate identity authentication and verification using the unique National

Identification Number (NIN) (NIMC, 2011). National Identity Management Commission, in

discharging of its duties, on July 2009 constituted a body to be known as the National Identity

Management and Harmonization Committee (NIMHC) to become the custodian for setting

standards for National Identity Management System. By the extension of the National Identity

Management Commission Act, Section 5, part (j), NIMHC established rules and standards that

shall be binding on all subjects, agencies, organizations, and entities that are collecting,

disseminating, or consuming identity data in Nigeria (NIMC, 2011).

Although NIMC has been seen to discharge its duties effectively, there exist some bottlenecks

which happen to hamper the successful discharge of duties. These bottlenecks arise mostly due

to the manual method of operation (paper/pen method of documentation). This project tends to

curb the known problems by designing an automated national identity card management system

for Nigerian people. Although there are different arms in the National Identity Management

Commission which takes the responsibility of checking and issuing the National Identity Card,

but as it concerns our area of interest in this project work, Department of National Civil

Registration under the NIMC, of Ngwo Local Government Area of Enugu State will be our

target.

2
1.2 STATEMENT OF THE PROBLEM

Currently, the processing of acquiring and managing national identity card in Nigeria involves

the manual method where paper and pen are used for documentation. Some many disadvantages

have been seen to be involved in this method; National Identity Card processing and

Administration system is not an easy task. This reason is because it involves absolute carefulness

to ascertain a population figure, prevent forgery and avoid the dangers of Impersonation,

duplication of multiple National Identity Cards for one particular person.

Scanning through reports for a file with definite information can be a techniques and time

wasting work because of the large volume of record to be scanned. Also to change particular

information may be as a result of marriage, change of name, or loss of the Identity card in other

words known as update will also be a tug of way for the individual in charge.

It creates weariness and loss of dedication to duties by the staff thereby restricting the powers of

the Department of National Civil Registration services following the constitution of the Federal

Republic of Nigeria which states that “No Public Officer shall put himself in a position where his

personal interest conflict with his duties and responsibilities” (1999 Constitution 5th schedule

point 1 no.1) The processing and administration of the computerized national identity card

management system will be capable of restricting access to non-authorized person, provide faster

access to knowledge and curb all the above known problems.

1.3 AIM AND OBJECTIVES OF THE STUDY

The main aim of this study is to review the manual method of operation being carried out in the

National Identity Management Commission, Ngwo Local government area of Enugu state and

design an automated system to manage identity cards. To achieve the stated aim, the following

specific objectives were laid out:

3
i. Design a system capable of capturing and storing data using client server architecture.

ii. System should check and prevent multiple possession of the National Identity card

iii. Deprive immigrant who are not citizen of the country from obtaining the national identity

card

iv. Provide a proper account of the identity card issued.

v. Develop a proper secured storage system which keeps all vital information ready for use

1.4 SIGNIFICANCE OF THE STUDY

This project work is of immense help to National Identity Management Commission in particular

because it will help them discharge their duties effectively. Data manipulation and loss will be

mitigated as only authorized users are granted access to database. This work can also server a

guidance and reference point to scholars researching the field of automated systems.

1.5 SCOPE OF THE STUDY

This is limited to the activities involved in National Identity Management Commission and its

administration system and also report generation on the National Identity Card Holders

Information. The system is built using PHP programming language and runs on a browser. The

client/server architecture ensures that the server database is updated whenever necessary and

every branch of the NIMC is updated too.

It is on these that the effectiveness and efficiency of the National Identity card section of the

Ngwo Local Government Area of Enugu State is built.

1.6 LIMITATION OF THE STUDY

The limitation is based on the facts which the researcher could not lay hands on pertaining to the

study, which evolves the problems of insufficient analysis. In addition to these limitations are

time factors and financial insufficiencies.

4
1.7 DEFINITION OF TERMS

As we go into this work, some words will need precise definition to enable the reader assimilate

the entire contents.

 NIMC: NIMC operates and regulates matters of national identity in Nigeria with services

covering National Identification Number (NIN) enrolment and issuance, National e-ID

card issuance, identity verification as well as data harmonization and authentication.

 Citizen: Under the provision of the amended constitution decree No. 32 of 1974, citizen

is any person who becomes citizen of any country either by birth, descendant,

Registration or Nationalization.

 Identity Card: Any document that may be used to prove a person's identity. If issued in

a small, standard credit card size form, it is usually called an identity card (IC, ID card,

citizen card)

5
CHAPTER 2

REVIEW OF RELATED LITERATURE

2.1 CONCEPTUAL FRAMEWORK

In this section the following will be discussed, core concept of identity card, identification

system in Nigeria, processes to have identification card, national identification number, present

attempt to have identification system and identification management in other countries

2.1.1 CORE CONCEPT OF IDENTITY CARD

Webster’s Ninth New Collegiate Dictionary defines Identity Card as a formal document that is

used by an authorized official of a country to one of its citizen. The Question is “what is an

identity card? As defined by many authors and dictionary including the encyclopedia, it is a

national document certifying state/Nationality, issued by the Government of a Country to every

individuals or person that is of the stipulated age of ownership. From the definition, National

Identity Card can also be called a true image of an individual or persons because it tells well

about a person.” Identity card as defined cannot be acquired from neither from school nor home.

But, there is a special organization or ministry that takes charge of both processing and

administration of National Identity Card. The ministry of Internal Affairs Under the Department

of National Civic Registration.

According to J. K. Plack in his book “information Processing and Identification” says that

identity card is a mark of Identification. And also, it tightly identifies the holder whose

photograph is placed in the identity card. It also contains all necessary information needed to

know about the holder of the identity card. Furthermore, he emphasized that the essence of such

identification is mainly for security purposes. During national identity card processing,

everything is put into consideration to check fraud of any form. Any fraud is detected and

6
canceled because the identity cards are made unique. It is not always easy. Forging of identity

card. And personification in areas where adequate attention is not given to processing of the

National identity card.

John Orgeon in his book. “Travelers and Juris” defines travelers as a process of making long

journey within or outside ones’ territory. People travels in other to visit people, do business with

people or for changing environment. To this effect, there is every need that he/she traveling bears

a mark of identification, which is the national identity card. The identity card being and

outstanding document, is very official and is only issued out and controlled by the Government

under the auspices of the ministry of Internal Affairs.

Dan Jougliow in his book. “Automatic Document and Processing” defines document processing

as preparation of printed evidences for births, deaths, marriage, and identification etc.

These document are processed to be very unified and easily maintained. With the introduction of

identity card, the problem associated with identity card processing system has been totally

solved. The computer maintains and access information about identity card holders automatically

with little human intervention. Fraud is eliminated. The machine assesses everything

automatically according to predefined program instruction using a defined government criterion.

Tony Ikara in a journal titled “Identity Card Processing Effects and Benefits” Says that identity

card represents the image of a nation. IKAM also emphasized that every National should attach

more importance to the mode of insurance and assessment of identity card since it will contribute

to a large extent sanitizing the image of countries within or outside their own country. Identity

card holders should at the same time exhibit good and recommendable character within and

outside the Nation at all time.

7
2.1.2. IDENTIFICATION SYSTEM IN NIGERIA

Presently, Nigeria has a national identity programme that is incomplete because not every

Nigerian participated in the last National identity (ID) Card project which means that not

everybody is uniquely identified. That is why the critical private sectors are doing their own

identification (Obi, 2006). The NIMS Handbook stated that there is currently no centralized

national identity database and no system of National Identity Management which efficiently

links public and private sector identity schemes. While the financial services sector has been

most proactive in the deployment of identification schemes for delivery of its services, several

different identification schemes and databases by the various institutions offering services to that

person has led to the duplication of an individual’s identity. Government agencies also hold a

number of databases with no viable integration of access or interoperability to enhance the

delivery of services within these government institutions. A reliable national identification

system for verification and secure authentication of an individual’s identity is still being

fashioned out with the plan introduction of the NIN project, which is a means of having a

dependable data base of its citizens (Omoniyi, 2012). Therefore, there is need for contributions

to have viable national network architecture (deployment map) for an identification management

system in Nigeria.

For the national identification management system, a low cost deployment map that allows

building on existing technology to create highly efficient, integrated systems that collect,

manage, organize, and disseminate information throughout different sectors in both public and

private organization is proposed by this paper for the nation.

8
2.1.2.1 Processes to have Identification Card

There have been different intended approaches to achieve the national identification project

among which is the talked about synergy among Nigerian Communications Commission (NCC),

NIMC and the Federal Road Safety Commission (FRSC) to deliver a national database, which

will effectively capture the details of Nigerians (Aginam, 2008). The outcome of this has not

been seen, though NCC is to transfer the data compiled during the SIM card registration to

NIMC. Other approaches are highlighted in Table 1.

Source: Onyemenam, C. E., Identity Management Systems in Africa: Nigeria’s Experience,

(www.nimc.gov.ng).

2.3.1. NATIONAL IDENTIFICATION NUMBER

The unique NIN is principally meant to give the country a dependable data base of its millions of

citizens, a process that has never been entirely completed in any programme in the past. The NIN

is a non-intelligent set of numbers assigned to an individual upon successful enrolment.

Enrolment consists of the recording of an individual’s demographic data and the capture of the

9
10 fingerprints, head to shoulder facial picture and digital signature which are all used to

crosscheck existing data in the national identity data base, to confirm that there is no previous

entry of the same data. Once this process is completed the data is then stored with the unique

number known as NIN (Omoniyi, 2012). When the numbers are issued, they will be uploaded on

chip-embedded multifunctional smartcards alongside citizens’ personal information (Oketola,

2012). This number when issued to a person cannot be used again, even if the person to whom it

is issued dies. It is the number that ties all the relevant records of a person in the data base and is

used to verify diverse identities. Access to the database is secure and graduated and that every

resident from 16 and above would soon be mandated by law to register their NIN or they would

be deprived of access to basic day to day commercial transactions (Omoniyi, 2012).

It is a unique identification number that every citizen and legal permanent resident must have. It

helps the government to plan. It is to differentiate two or more people with the same names. This

makes identification easier. A lot of other information like home address, phone number, date of

birth, parent’s information, DNA information, criminal record, driving record, marriage

information and even employment record of people are stored with the number. Hence, a

complete life history of a person can be pulled from the computer (by authorized government

officials) with his social security number (Omoniyi, 2012).

2.1.4 PRESENT ATTEMPT TO HAVE IDENTIFICATION SYSTEM

Presently, Nigeria Interbank Settlement System (NIBSS) is working in collaboration with NIMC

to integrate the Nigeria Central Switch, NCS, operated by NIBSS with the NIMS. This

integration will enable banks to conduct identity verification on NIMS through NIBSS to issue

NIN as well as a General Purpose Identity Card (Komolafe, 2012).

10
The front-end partners (FEP), of the NIMC had agreed with NIMC, CBN, and NIBSS that

starting from 1st of September 2012, they would commence an enrolment exercise for all banks’

customers nationwide with a view to capturing their biometrics, issuing them the National

Identity Numbers (NIN) and the General Multi-Purpose Identity Cards (GMPC), as well as

providing verification infrastructure for linking their bank accounts to the issued NIN within the

NIMC data base. This enrolment exercise was planned to be completed by the 31st December

2012 (Komolafe, 2012). This is yet to take off.

2.1.5. IDENTIFICATION MANAGEMENT IN OTHER COUNTRIES

Many countries around the world have either implemented, or are in the process of embarking on

national ID projects. The key motives behind such initiatives is to improve the identification and

authentication mechanisms in order to reduce crime, combat terrorism, eliminate identity theft,

control immigration, stop benefit fraud, and provide better service to both citizens and legal

immigrants (Al-Khouri, 2006). Many countries around the world have national identification

cards, although the type of card and the purposes for which it is used varies (Wang, 2003). The

majority of cards in developed nations contain name, sex, and date of birth and some with

photographs and fingerprints (Wang, 2003). Some nations have much more data on their cards.

Wang (2003) cited examples and the purpose of identification card management in some

countries. In Korea, the card has name, birth date, permanent address, current address, military

record, issuing agency, issued date, photograph, national identification number, and prints of

both thumbs.

The Italian card contains identity number, name, photo, signature, fingerprint, date and place of

birth, citizenship, residency, address, marital status, profession, and physical characteristics. In

Spain, when someone works under contract the identification must be used to demonstrate work

11
eligibility, and it also is used for the health care system. In Kenya, the national identity card is

required to get a job, get married, purchase or sell land, or register to vote. In Belgium, everyone

over the age of fifteen is required to carry the identification card at all times. The card is used for

banking, billing, rental agreements, proof of age when buying alcohol and cigarettes, or entering

an adult-only business. A police officer can ask to see the card of anyone in a public space and

does not need to have any particular justification (Wang, 2003). As a result of the rapid growth

of the economy as well as the population over the past few years in the United Arab Emirates

(UAE), the project which was kicked off in June 2003, aimed to develop a modern identity

management system with two strategic objectives addressing security and economical

requirements (Al-Khouri, 2006).

2.2 THEORETICAL FRAMEWORK

This work is anchored on Technology Acceptance Model (TAM) which is widely studied and

verified by different studies that examine the individual technology acceptance behavior in

different information systems constructs.

2.2.1 Technology Acceptance Model (TAM)

Technology Acceptance Model has been developed by Davis, (1989) is one of the most popular

research models to predict use and acceptance of information systems and technology by

individual users. TAM has been widely studied and verified by different studies that examine the

individual technology acceptance behavior in different information systems constructs.

In TAM model, there are two factors perceived usefulness and perceived ease of use is relevant

in computer use behaviors. Davis defines perceived usefulness as the prospective user’s

subjective probability that using a specific application system will enhance his or her job or life

performance. Perceive ease of use (EOU) can be defined as the degree to which the prospective

12
user expects the target system to be free of effort. Behavioral intention is the measure of the

likelihood of a person employing the application.

Chau and Hu (2002) combined the factor of peer Influence with Technology Acceptance Model.

According to study by Franco and Roldan (2005) the relationship between perceived usefulness

and behavioral intention was strong among goal‐directed users. Chau and Hu (2001) compared

three models Technology Acceptance Model (TAM), the Theory of Planned Behavior (TPB),

and a decomposed TPB model that is potentially adequate in the targeted healthcare professional

setting in Hong Kong. The results indicated that TAM was superior to TPB in explaining the

physicians’ intention to use telemedicine technology. The study conducted by Sun and Zhang,

(2003) found voluntariness can be factor in determining the behavioral intention to use.

2.3 EMPIRICAL REVIEW

Mba, Nwogbaga, and Nnaji, (2018), analyzed the establishment of the National Identity

Management Commission (NIMC) by Act No. 23 of 2007 to replace the defunct Directorate of

National Civil Registration (DNCR) was aimed at reforming the identity sector in Nigeria and to

provide a unified or centralized National Identity Database and secured means to irrefutably

assert the identity of Nigerians which we saw as a veritable or rather key to nation building in

Nigeria. But as of June 2016, only about 9.5million Nigerians had been captured into the

National Identity Database (NIDB) and as of May 2016, only about above 1million National “e-

ID” card had been produced and about 300,000 National e-ID cards collected. This propelled our

search light on the challenges and prospects of NIMC in the light of modernization prism.

Relying quantitatively on secondary data, this study reflected on the roles, challenges and

prospects of NIMC in nation building and recommended integrated information system to realize

a functional national identity for effective nation building.

13
Ojaide, (2010), examined an effective national identification system is a necessity in any national

government for the proper implementation and execution of its governmental policies and duties.

This thesis aims at restructuring Nigeria national identification system so as to make it effective

in addressing its political and civil problems, which ranges from manipulated census count

figures and electoral fraud to economic fraud and civil problems. These problems are arguably

due to Nigeria’s ineffective national identification system. We proposed in this thesis, a

restructured Nigeria national identification system to help address these political and civil

problems. The proposed identification system is designed such that it will help to address

identification problems in general, reduce elections and census count fraud to a minimum and be

useful for the execution of policies in sectors of the economy.

Focus Group Technical Report, (2016), evaluated the status and characteristics of 48 national

identity programs and initiatives in 43 developing countries were reviewed, including an

evaluation of how these programs are being connected to or used for service provision. The

identity programs reviewed are mainly government-issued national IDs. However, other types of

national identity programs with links to various services including voter cards, passports, and

two programs targeting the poor and the banking population were also reviewed. Following a

brief review of the roles of identity systems in development and recent identity system trends, an

overview of the 48 national identity programs, including technical features (such as whether

physical identities incorporate an electronic component or are embedded with biometric

features), implementation status, population enrollment strategies, and coverage is presented in

the report. The implementation challenges around accountability, privacy, data management,

enrollment, coverage, cost, and harmonization of identity programs were also reviewed. Finally,

the functional applications of national identity programs, reporting how these programs are

14
linked with services in finance, health, agriculture, elections, and other areas, and analyzing

whether particular identity program characteristics are associated with functional applications are

discussed in the report.

Ibrahim and Abubakar, (2016), Despite several debates on the implementation of Identity

Management System in Nigeria. IDMS stands to play an important role on economic growth,

social capital and political development in a country. It is argued that IDMS represents a new

“General Multi-Purpose Smart Card” with the potential view to link a secure database with

biometric verifications for an individual identity. It is also generating a sustained increase in

economic growth through processes of technological development and innovation. Government

sees the application and use of Identity Management System as generating higher national

productivity, job creation, competitiveness and national development.

Oluyemi, Ebelogu, Agu and Hammawa, (2019), evaluated the Nigeria’s national identity systems

that exist today, which were developed on centralized data management system, may soon

present operational risks for citizens and government agencies due to single points of trust and

failure which make the system vulnerable to attack. Decentralized identity management system

is a solution to address this challenge, which specifies a user-focused approach that gives full

control of identity back to the individual. This paper proposes the blockchain, which is a secure

and decentralized system, as the platform to achieve this. Taking Nigerian’s National Identity

Management System as a case study, a blockchain-based identity management system is

proposed. Models for identity creation, modification, authentication and disclosure are presented.

Prevention of Sybil attack and developing of handshake protocol model for identity attribute

disclosure are other contributions. Lastly, a prototype of the proposed system is developed in

15
Python programming language to demonstrate the salient features that meet the research

objectives.

2.4 SUMMARY OF REVIEWED LITERATURE

In summary, the National Identity Management Commission and design an automated system to

manage identity cards. It considers the conceptual framework that includes core concept of

identity card, identification system in Nigeria, processes to have identification card, national

identification number, present attempt to have identification system and identification

management in other countries. This work is also anchored on Technology Acceptance Model

(TAM) which is widely studied and verified by different studies that examine the individual

technology acceptance behavior in different information systems constructs. And also considers

the empirical studies wear related articles was reviewed.

16
CHAPTER 3

RESEARCH METHODOLOGY

3.1 INTRODUCTION

This section will offer a description of the existing system, derive its limitations and also provide

an in depth description on the proposed national identity card management system. It will also

lay out the targeted objectives of the proposed system. The section will also look at the

differences between the existing system and the proposed system and also describe its feasibility

study. The design process will also be displayed using unified modeling languages.

3.1 FACT FINDING METHOD

During the course of this study, the researcher applied different method of finding fact. The

methods include.

i. Interview: The researcher visited the National Identity Management Commission Office

(especially the Administrative, Field Operation, Local government) which was used as a

case study and interviewed the staff and personnel available on seat orally. The persons

involved responded to the interviewed question to the best to their knowledge. The facts

and answers incurred from the discussion made it possible for the researcher. to begin the

study. Some of the interview question include: -

 What is national identity card?

 What is the importance of the national identity card?

 What are the conditions for issuing national identity card?

 What are the major rules of the operation and Border patrol section over the

processing of the identity card?

 What are the objectives of the existing National identity card processing system?

17
 What are the problems encountered by both the operation/Border Patrol as well as

the management as a whole?

 What are the possible solutions?

ii. References to Written Document and Manual: The researcher addition to her findings

visited some libraries and the department of national civic registrations library and made

references to already written document for more details concerning this study. To this

effect, the fact provided by the referenced next made it possible for the completion of the

study work.

3.3 ORGANISATIONAL STRUCTURE

Organizational structure of NIMC

18
3.4 ANALYSES OF THE EXISTING SYSTEM

There already exists a semi-computerized sector in the management of identity cards. But its

existence does not give full criteria of what is required to process a particular identity card. The

computer present is only used to document the details of registered users for printing using

Microsoft Word while the rest activities are carried out manually. The parable mode of operation

is very expensive to maintain and it is very difficult to operate. This is because a high number of

registered citizens which creates intensive tasks for the workers to maintain and thereby give

avenue to fraud in the identity card section.

The ‘input’ being rigid, does not allow easy operation in the case of error because it is made on

paper. To this effect, there is no room for easy update because of its ancient system set up. Data

update and assessment update is not reliable due to partial manual operation in its achievement.

Report Generation which aids processing of national identity card are not made timely therefore

delays fast decision. Also, it is always not as accurate as desired by the management due to a lot

of discrepancies during the processing even when there is a need of inspection to know how the

service of department works, there seems to be a delay in the report generation.

Therefore, the existing system has failed to meet up entirely with the expectation requested of it

before the design started. This is a result of the advancement in the society which has outgrown

the prospects of the existing system design.

3.4.1 Input, Process, and Output Analysis of the Existing System.

i. Input Analysis: The input to the system is made on papers in forms. The forms are filled

by the National Identity applicant and submitted to the clearance officer for clearance

then to the duty clerk who files it and makes it flow. Before a form is issued to the

applicant, he/she must meet some necessary condition stated as thus: -

19
 Letter of identification from the local government through the councilor in charge

of your areas.

 Age declaration of birth certificate.

And until these conditions are met, no applicant can be given a right to fill a form in procurement

for a national identity card. Since the input is very rigid, it does not allow for easy correction of

data if any mistake is noticed. Also due to the mistakes and clean up using fluids, it makes input

form very untidy.

ii. Process Analysis: The processing analysis is the use of laid down conditions in assessing

the application record. This processing is a careful exercise. It takes a lot of time to come

to a conclusion on whether to issue national identity card to an applicant or not. This also

involved the checking of the validation of the supplied record by the Applicant.

iii. Output Analysis: The output is the National identity card booklet information which

builds up the national identity card holders records with the Department of national civic

Registration or the ministry of internal affairs and national identity card section. These

records are kept for security purposes and for the major purposes of references when

necessary.

The sample below shows the national identity card output. The management when necessary

references to these items listed.

20
ID card form

3.5 ANALYSIS OF THE PROPOSED SYSTEM.

The propose system consists of the Integrated Database created from the simulation of National

Identity Management Commission (NIMC). The system is designed using web-based

technologies which give users ability to access it from any location. Users can fill and upload

their data when allowed by the admin. Users can also request for a change of details which are

either approved or rejected by the admin.

The modus operandi of the proposed voter registration system is as follows:

i. Citizens’ data populate automatically from existing national databases to form authentic

database of citizens. If existing database is unavailable, a page is shown for voters to

register using their personal details

ii. Citizens who have incomplete data are notified to upload the required documents

iii. On successful registration, a unique identification number is generated for each user.

21
iv. Admin can print the national identity card and issue to users

3.5.1 Justification of the Proposed System

Computers have added immense effort in the monitoring of national identity card holders in and

out of Nigeria. Since we are in the path of information technology growth, we need the basic

capability to install and use advanced computers. With computer installed in NIMC (especially

the identity card section) we are expected to have these.

 Easy data storage, update and retrieved very easy and accurate.

 Accurate, timely and comprehensive report generation on processing is achieved.

 Also, a special protective means are introduced into the system.

 At the center of any on-line, real-time information system, one needs a database

technology, which permits the establishment or relationship between various pieces of

information. This facilitates the rapid storage, classification, retrieved, update as well as

the assessment of the data.

 As easy to use terminals which can be operated by the consumer of information.

In future, we will see the rapid introduction of intelligent work stations which are able to

perform memory functions. Intelligence is the value ended components in computers.

3.6 PROJECT METHODOLOGY

Incremental methodology was used in this study. In incremental model the whole requirement is

divided into various builds. Multiple development cycles take place here, making the life cycle a

“multi-waterfall” cycle. Cycles are divided-up into smaller, more easily managed modules. Each

module passes through the requirements, design, implementation and testing phases. A working

version of software is produced during the first module, so you have working software early on

22
during the software life cycle. Each subsequent release of the module adds function to the

pervious release. The process continuous till the complete system is achieved.

Steps of incremental model

Requirements->design and development->testing->implantation

The advantage of the incremental model is that it generates working software quickly and early

during the software life cycle; and this model is more flexible, less costly to change scope and

requirements. It is also easier to test and debug during a smaller iteration. In this model customer

can respond to each built; it also has a lower initial delivery cost; easier risk management

because risky pierces are identified and handled during is iteration.

Disadvantage of the incremental model is that it needs a clear and complete definition of the

whole system before it can be broken down and built incrementally. The total cost is higher than

waterfall. We use the incremental model when the requirements of the complete system are

clearly defined and understood. The major requirement must be defined; however, some details

can evolve with time. There is a need to get a product to the market early. And resources with

needed skill set are not available.

3.7 SYSTEM DESIGN

The purpose of the system is to produce specifications, which will enable a complete, accurate

and specialized implementation of the new system. The new system designed after a detailed

analysis of the existing system. The functional units of the existing system were included the

problem associated with them were detected and possible solutions proffered in the new design.

3.7.1 System Architecture

The client/server architecture has been use in the development of this system. There the database

application and the database are separated into two parts: a front-end or client portion, and a

23
backend or server portion. The client executes the database application that accesses database

information and interacts with a user through the keyboard, screen, and pointing device such as a

mouse. The server executes the software and handles the functions required for concurrent,

shared data access to a MySQL database.

Although the client application and SQL can be executed on the same computer, it may

be more efficient and effective when the client portion(s) and server portion are executed by

different computers connected via a network. The following sections discuss possible variants in

the client/server architecture.

Note: In a distributed database, one server may need to access a database on another server. In

this case, the server requesting the information is a client

24
Figure 2: system architecture-client/server

3.7.2 Input Specification

The input to the system is flexible and precise. It is also supplied through the system is flexible

and precise. It is also supplied through the keyboard.

The input items include,

 Surname:

 Sex: age:

 Date of birth:

 Height:

 State of origin: L.G.A

 Current address:

 Profession:

 Marital status:

 Next of kin:

 Blood group:

 Genotype:

25
Also, there are some spaces reserved for the officers in charge of National identity card section.

The input format is thus: -

 Surname: other names:

 Sex: male female

 Date of birth: age:

 Place of birth: town: state:

 State of origin: L.G. A town:

 Current address: state: town:

 Profession / occupation:

 Height: blood group: genotype:

 Marital status: Single married widowed divorced

 Special features

 Maiden name

 Particulars of next of kin

 Surname:

 First name: middle name:

 Address:

 Applicants origin:

 Place: state:

 Date of id card issue: place:

 State: LGA: RC: sequence no.

 Id form number:

26
 Personal number:

3.7.2 Output Specifications

Here, the input is determined by the output. The output is very precise and comprehensive. It is

the report generated on citizen issued with the National Identity Card. Also the output design

tries to create room for assessment of records and data.

The fields that could be found at the output include:

 Name:

 Address:

 Age:

 Sex:

 Marital status:

 Date of birth:

 State of origin:

 Height:

 Current address:

 Profession:

 Occupation:

 Next of kin:

 Genotype:

 Blood group: etc.

27
NATIONAL IDENTITIY CARD FORMAT

NAME: ………………………..… DATE OF BIRTH…………….……

ADDRESS:……………….. TOWN:……………………………….

AGE:…………………………….. STATE:……………………………….

HEIGHT:……………………….. BLOOD GROUP:……………………

L.G.A:…………….TOWN:……………ID FORM NO:………………….

NATIONALITY:………………….. PERSONAL NO:……………………

PROFESSION/OCCUPATION:…………………………………………

R.C:…………………..SEQUENCE N0…………………….

DATE OF ID ISSUED:…………………… SIGNATURE:…………….

3.7.3 FILE DESIGN

The file design was for the purpose of good storage of received data., proper management

assessment and reliable retrieval of data. MySQL database was used for the storage and has the

following structure.

28
FILE STRUCTURE

VARIABLE

WIDTH
NAME
FIELD

TYPE
1 SURNAME SN CHARACTER 15

2 OTHERNAME ON CHARACTER 20

3 SEX SE CHARACTER 3

4 DATE OF BIRTH DB NUMERIC 8

5. PLACE OF BIRTH PB CHARACTER 10

6 STATE OF ORIGIN SO CHARACTER 10

7 CURRENT ADDRESS CA CHARACTER 12

8 PROFESSION/OCCUPATION PR/OC CHARACTER 8

9 HEIGHT HE CHARACTER 3

10 BLOOD GROUP BG CHARACTER 2

11 MARITAL STATUS MS CHARACTER 8

12 MAIDEN NAME MN CHARACTER 10

13 NEXT OF KIN NK CHARACTER 10

14 DATE OF ID CARD ISSUE DCI NUMERIC 3

15 PLACE PL CHARACTER 8

16 STATE ST CHARACTER 8

17 L.G.A LGA CHARACTER 10

18
RC RC NUMERIC 8
19 SEQUENCE NUMBER SN NUMERIC 3

20 ID FORM NUMBER IFN NUMERIC 3

21 PERSONAL NUMBER PN NUMERIC 8


Database Table

29
3.7.4 Unified Modeling Language Diagram

A formal model of the proposed system is built using Unified Modeling Language

(UML). The UML is a modeling system which provides a set of conventions that are used to

describe a software system in terms of objects. It offers diagrams that provide different

perspective views of the system parts. The UML diagrams used to model the system are;

Procedure charts, Flowcharts, Use Case, Sequence and Activity diagrams.

i. Procedure Chart: This is a chart on which are graphically shown in sequence the separate

details that make up a complete process (as of a particular job operation

Procedure Chart:

30
ii. Flowchart: A flowchart is simply a graphical representation of steps. It shows steps in

sequential order and is widely used in presenting the flow of algorithms, workflow or

processes. Typically, a flowchart shows the steps as boxes of various kinds, and their

order by connecting them with arrows.

Flowchart

31
iii. Information Diagram

32
CHAPTER 4

SYSTEM DESIGN AND IMPLEMENTATION

4.1 INTRODUCTION

System implementation involves checking each of the system modules to make sure that they are

functioning properly. A design may be implemented in various ways depending on the priorities

of the software developer. In this work, several factors were taken into consideration during

implementation. These factors include:

 Correctness: The implementation was carried out with the aim of the final product

meeting the user’s need.

 Robustness: Robustness is the quality of being able to withstand stresses, pressures or

changes in procedure or circumstance. Robustness was emphasized extensively in the

implementation of this work. Defensive programming techniques were applied. Strict

checking procedures were included to eliminate the possibility of unacceptable effects on

system response.

 Performance: Software performance is the extent to which a product meets its constraints

with regard to response or space requirements. Performance optimization especially as

regards speed / response time and appropriate search techniques were employed to ensure

good response time.

4.2 CHOICE OF IMPLEMENTATION TECHNOLOGIES

PHP was chosen as the programming language which serves as the client to enable me to create the

input and output forms while the MySQL database was used as the database server. PHP is a

framework (programming) for development of enterprise application using object oriented

programming. For most software applications there exists a wide variety of languages in which the

33
application may be implemented. Apart from mere suitability of the programming languages, many

factors influenced the use of PHP as the programming language for the source code shown in the

APPENDIX and the MySQL database as the server.

Reasons for Choosing PHP

i. Speed: Being a compiled language, it is very fast and speed is important in database

application.

ii. Environment: It can run on all browsers.

iii. Efficient: The final code tends to be compact and run quickly.

iv. Portability: If compiled, it can be executed in different machines with alteration of

source code.

v. Maintainability: To ensure maintainability, this program is broken into modules and

each module is assigned a specific function. This will make maintenance of the system

easier.

vi. Security: it has proper backups, quality control mechanism for all modules and

unauthorized access to sensitive data is prohibited.

4.3 SYSTEM REQUIREMENTS

The system requirements specification encompasses the minimum hardware and software

requirements that will be required by the application to ensure smooth running and performance.

4.3.1 Software Requirement

Software is a collection of programs or instructions written in any computer language, which

enables flexibility to do whatever the user wants. This package can only be run and developed

with the following minimum software.

34
Client side

i. Minimum OS: windows 7

ii. Minimum Ram: 1 GB

iii. Minimum Hard disk: 10GB

iv. Minimum Network card: 100mps

v. Finger print scanner drivers installed

For server side

i. Minimum OS: windows 7

ii. Minimum Ram: 2 GB

iii. Minimum Hard disk: 30GB

iv. Minimum Network card: 100mps

v. Database: XAMPP or WAMP server

vi. Finger print scanner drivers installed

4.3.2 Hardware Requirement

The system functions well with a good computer compatible with a hard disk drive of 30GB.

This is needed to save the program so that it can be made available any time. It requires a visual

display unit (VDU) of high resolution and graphic ability for good display of all outputs. A

functional CDROM / external drive is needed to be used as backup or disk in case the programs

served on hard disk is eventually destroyed by a virus. An uninterrupted power supply (UPS) is

needed to sustain power failure for sometimes whenever PHCH puts of power supply. This

software requires the following minimum hardware for its development and running;

i. Mantra Fingerprint scanner

ii. Minimum Ram: 2 GB

35
iii. Minimum Hard disk: 30GB

iv. Minimum Network card: 100mps

v. 14’ super video graphic adapter monitor (SVGA)

vi. A mouse or mouse sensitive used on laptops

vii. Uninterrupted power supply (UPS), lasting for at least 24 hours.

viii. Switch / wireless router for local area network connection

ix. The HP Laser jet 5 printers for a hard copy printout.

4.4 SYSTEM TESTING

Test Cases

The tables below show test cases made on the system

Test Case Number 1.0

Test Case Name Admin login

Application lunched and login form


Precondition
loaded

Test Case Input Enter username and password

Test Case Expected Output Admin form load

Output Login successful

Table 5.1: test case 2

36
Test Case Number 2.0

Test Case Name Register Citizen

Precondition Application lunched and input fields to collect data is shown

Test Case Input Fill in all details and click submit

Test Case Expected Output Form submitted successfully to database

Output Successful

Table 5.2: test case 3

Test Case Number 3.0

Test Case Name View Registered Citizens

Precondition Application lunched and registered citizens displayed

Test Case Input Click Registered Citizens

Test Case Expected Output Registered citizens displayed

Output All Successful

Table 5.3: test case 3

4.5 SYSTEM IMPLEMENTATION

The program complexity were broken down into simpler units and solved separately and

individually. The units were represented as module in the artifacts of the design. This makes it

easy for modifications in order to meet with the new technological changes. There were a total of

five modules in the entire program design. As earlier, stated. The modules were represented

individually.

 Home Module: This is the landing page when any user visits the website

37
 Login Module: The admin and standard users can log in from here

38
 Registered citizens: Displays all the registered citizens with their unique ID

 New user: New user is created from here to manage registration but with fewer

privileges

39
 Announcements: Admin can add announcement to all the users

 Print ID: This shows the hardcopy printing of the generated ID cards

40
4.6 PROGRAM FLOWCHARTS

i. Input record flowchart

Input record flowchart

41
ii. Update record flowchart

Update record flowchart

42
iii. Delete record flowchart

Delete record flowchart

43
iv. Display record flowchart

Display record flowchart

4.7 DOCUMENTATION

This section details the manual guide on how to run the program effectively. All the steps that

will help in the smooth running and operating or using the program are all documented.

Running the App

NOTE: The software is live and interacts with database. The host computer must have a running

local server (WAMP or XAMPP) before it will work.

1. Put on your server.

2. Copy nimc fold to C:/xamp/htdocs if you are using XAMPP or C:/wamp/www folder

if you are using WAMP.

3. Open your browser and go to localhost/phpmyadmin

44
4. Click on import then select the cert.sql file in database folder

5. Open your browser and go to localhost/nimc

Admin Login Details

Username: admin

Password: 123456

Standard User Login

Username: cuzzy

Password: 123456

45
CHAPTER 5

SUMMARY, CONCLUSION AND RECCOMMENDATION

5.1 SUMMARY

The work has been designed and computerized for the National Identity Card section of the

department of National Civic Registration under the ministry of National Identification

Management Commission (NIMC). To assess and monitor the procurement of the National

Identity Card by individuals in order to eradicate the forgery and duplication of National Identity

Cards thereby restricting individuals only to one national identity card for citizens. Using PHP

programming language, we have been able to model the NIMC process.

5.2 CONCLUSION

Computer has made work very ready and interesting. The national identity card as produced in

time and adequate measures are taken to maintain proper record and security pursuits. This work

made the staff to have more time to them. Also by implementing of this work, the huge

maintenance of the manual record system will drastically be reduced.

5.3 RECOMMENDATION

Computer has all times proven its superiority over every other technological invention. To this

effect, I recommend that for further elaboration on this project.

 Every aspect of the National Identity Card operation should cease to a manual operation.

 A system analyst should be employed to make-up the board of decision that are

responsible for planning and implementing the attire of National Identity Card issuance

and assessment.

 The workers should be given more incentives to enable them put in relenting efforts in

discharging their duties.

46
 The computerization should be maintained up-to date at all times.

 Security code inscription should be maintained on all the National Identity Card.

 The staff should be trained to very computer literate.

 The program should be modified to suit all the sections of Department of national civic

registration.

47
REFERENCES

Adesanya, A. (2020). National identity app not yet approved for public use—NIMC. Business
Post. https://businesspost.ng/general/national-identity-app-not-yet-approved-for-public-
use-nimc/.

Aginam, E. 2008. Mobile Fraud - NCC to Collaborate with National ID Commission on SIM
Card Registration. Vanguard Newspaper. Accessed on May 10, 2011 at
allafrica.com/stories/200808181274.html

Akinlabi, A. 2006. Nigeria National Identification Card -Its Costs and Benefits. Accessed on
May 10, 2011 at www.gamji.com/article6000/NEWS6202.htm

Beynon-Davies, P. (2011). The UK national identity card. Journal of Information Technology


Teaching Cases, 1(1), 12–21. https://doi.org/10.1057/jittc.2011.3

Bozbeyoglu, A. C. (2011). Citizenship rights in a surveillance society: The case of the electronic
ID card in Turkey. Surveillance & Society, 9(1/2), 64–79.

Clark, V. L. P., & Ivankova, N. V. (2015). Mixed methods research: A guide to the field, 3(9).
Sage publications.

Court, A. (2014). Branding Nigeria: MasterCard-backed I.D. is also a debit card and a passport.
Cnn.Com. http://edition.cnn.com/2014/09/25/business/branding-nigeria-mastercard-
backed-i-d-/index.html.

Creswell, J. W., & Clark, V. L. P. (2017). Designing and conducting mixed methods research.
Sage publications.

Curry, L., & Nunez-Smith, M. (2014). Mixed methods in health sciences research: A practical
primer, 1(2). Sage publications.

Dahir, A., & Mureithi, C. (2020). Kenya’s High Court delays national biometric ID Program.
New York Times. https://www.nytimes.com/2020/01/31/world/africa/kenya-biometric-
ID-registry.html.

Dan, J. (2009). Automatic Document Processing.Chicago: Abram’s Press.

Dunn, H. S. (2020). Risking identity: A case study of Jamaica’s short-lived national ID system.
Journal of Information, Communication and Ethics in Society.

Elebeke, E. (2020). NIMC debunks claim on breach of database. Vanguard Newspapers.


https://www.vanguardngr.com/2020/12/nimc-debunks-claim-on-breach-of-database/.

Gelb, A., & Clark, J. (2013). Identification for development: The biometrics revolution. Center
for Global Development Working Paper, 315.
48
Gelb, A., & Metz, A. D. (2018). Identification revolution: Can digital ID be harnessed for
development? Brookings Institution Press.

George C. Paul, (2005). Concerns about National ID Cards. Accessed on May 10, 2011 at
http://www.frost.com/prod/servlet/market-insight-top.pag?docid=38947972

Global Partnership for Financial Inclusion. (2018). G20 digital identity onboarding. World Bank.
https://books.google.co.uk/books?id=TZc8zQEACAAJ.

Goel, V. (2018). India’s top court limits sweep of biometric ID program. The New York Times.
https://www.nytimes.com/2018/09/26/technology/india-id-aadhaar-supreme-court.html.

Haggerty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. The British Journal of
Sociology, 51(4), 605–622.

Hammouchi, H., et al. (2019). Digging Deeper into Data Breaches: An Exploratory Data
Analysis of Hacking Breaches Over Time. Procedia Computer Science, 151, 1004–1009.

Hans Jespersen, (2010). Evolving the Digital Nervous System.


http://solacesystems.com/blog/company/news-release/evolving-the-digital-nervous-
system/

Hersey, F. (2021) Centralized, decentralized or neither: Which national digital ID system will
you choose? Biometric update. Available from:
https://www.biometricupdate.com/202112/centralized-decentralized-or-neither-which-
national-digital-id-system-will-you-choose [Accessed 24/03/22].

Ibekwe, N. (2015). Over N121 billion wasted, Nigeria’s troubled National ID Card project in
fresh controversy. Premium Times.
https://www.premiumtimesng.com/news/headlines/183720-over-n121-billion-wasted-
nigerias-troubled-national-id-card-project-in-fresh-controversy.html.

Ibrahim, I. A. & Abubakar, Y., (2016). The Importance of Identity Management Systems in
Developing Countries. International Journal of Innovative Research in Engineering &
Management (IJIREM), ISSN: 2350-0557, Volume-3(1), 1-12

Ifeoma, P. (2020). National digital identity card: NGO seeks injunction against NIMC over data
breach…. DNL legal and style. https://dnllegalandstyle.com/2020/national-digital-
identity-card-ngo-seeks-injunction-against-nimc-over-data-breach/.

John, O. (2017). Travelers and Tourism.Lagos: Vanguard Press.

Johnson, J. (2021) Nigeria internet user penetration 2026. [Online] Statista. Available from:
https://www.statista.com/statistics/484918/internet-user-reach-nigeria/[Accessed
25/03/22].

49
Khaira, R. (2018). Rs 500, 10 minutes, and you have access to billion Aadhaar details. The
Tribune. https://www.tribuneindia.com/news/archive/nation/rs-500-10-minutes-and-you-
have-access-to-billion-aadhaar-details-523361.

Komolafe Babajide 2011. Customers to provide National Identity Number at banks – CBN. June
1, Vanguard Newspaper.

Krajewska, M. (2017). Documenting Americans: A political history of national ID card


proposals in the United States. Cambridge University Press.

Lyon, D. (2009). National IDs in a global world: Surveillance, security, and citizenship. Case
Western Reserve Journal of International Law, 42, 607.

MacDonald, L. 2011. Leapfrogging Technology, the Case for Biometrics: Alan Gelb Accessed
on May 10, 2011 at
http://blogs.cgdev.org/global_prosperity_wonkcast/2011/01/11/leapfrogging-
technologythe-case-for-biometrics-alan-gelb/.

Mba, I. K., Nwogbaga, D. & Nnaji, F., (2018). The Philosophy and Politics of National Identity
Management in Nigeria: A Case for Nation-Building. African Journal of Politics and
Administrative Studies, 11(1),

National Bureau of Statistics, Facts and Figures about Nigeria, 2008. Accessed on May 10, 2011
at http://www.nigerianstat.gov.ng/ext/latest_release/Fact08.zip

National Identity Management Commission, 2011. National Identity Management System


Handbook on Business Processes, Standards and Specifications 6th January, 2011.
Accessed on May 10, 2011 at
www.nimc.gov.ng/hic/Handbook_on_Business_Processes.pdf

National Identity Management Commission, 2011. Public Notice on the Proposed Adoption of
Biometrics and Demographics Data Standards and Verification Procedure for the
National Identity Management System (NIMS). Accessed on May 10, 2011 at
http://www.nimc.gov.ng/downloads/adverts/Public_Notice_on_Proposed_Biometrics.pdf

Obi, E. U. 2006. National Identification Policy for Nigeria: An Action Agenda. Accessed on
May 10, 2011 at www.dawodu.com/obi6.htm

Oketola, Dayo 2012. Nigerians to get national identity numbers in May: March 26, Punch
Newspaper. Monday, 02 April. Daily Trust online

Oluyemi A., Ebelogu, C. U., Agu E. O. & Hammawa, M. B., (2019). Development of a National
Identity Management System using Blockchain Technology, 12(4), 13-36; ISSN 2006-
1781

50
Ominyi O. A. (2012). "Information-Theoretically Secure Data Origin Authentication with
Quantum and Classical Resources". Cryptography. 4 (4): 31-41. arXiv:2011.06849.
doi:10.3390/cryptography4040031. S2CID 226956062.

Onyemenam, C. E. Identity Management Systems in Africa: Nigeria’s Experience Available


nline at www.nimc.gov.ng.

Paul, C., (2007). identity card processing effects and benefits: Kleen University Press.

Wang, T.V. 2003. The Debate Over a National Identification Card. The Century Foundation
Homeland Security Project, Issue in Brief. Accessed on May 10, 2011 at
http://tcf.org/publications/pdfs/pb284/National_ID_Card.pdf.

51
APPENDIX

Source Codes

<?php

session_start();

$current = $_SESSION['username'];

?>

<!DOCTYPE html>

<html>

<title> | Registered user</title>

<meta name="viewport" content="width=device-width, initial-scale=1">

<link rel="stylesheet" href="style/w3.css">

<link rel="stylesheet" href="style/bootstrap.min.css">

<link rel="icon" href="images/icon.png">

<style>

input[type=text], input[type=password] {

width: 100%;

padding: 12px 20px;

margin: 8px 0;

display: inline-block;

border: 1px solid #ccc;

box-sizing: border-box;

</style>

52
<body>

<div class="w3-container w3-red">

<h1>ONLINE IDENTITY CARD SYSTEM</h1>

</div>

<ul class="w3-navbar w3-light-grey">

<li><a href="administrator.php">Registerd citizens</a></li>

<li><a href="newuser.php">Register User</a></li>

<li><a href="announcements.php">Announcements</a></li>

<li><a href="myaccount.php">Account Update</a></li>

<li><a href="users.php">Customize Users</a></li>

<li class="w3-right"><a class="w3-green" href="logout.php">Logout (<?php echo"$current"; ?

>)</a></li>

</ul>

<div class="container">

<h2>Registered citizens</h2>

<table class="w3-table-all">

<tr>

<th>NAME</th>

<th>date of birth</th>

<th>ADDRESS</th>

<th>BLOOD GROUP</th>

<th>TOWN</th>

<th>L.G.A</th>

53
<th>STATE</th>

<th>OCCUPATION</th>

<th>PHONE NUMBER</th>

<th>VIEW</th>

<th>DELETE</th>

</tr>

<?php

include 'database_configuration.php';

$sql = "SELECT * from registration ORDER BY date";

$result = $conn->query($sql);

if ($result->num_rows > 0) {

while($row = $result->fetch_assoc()) {

echo "<tr><td>" . $row["regstrationid"]. "</td><td>" . $row["name"]. "</td><td>" .

$row["dateofbirth"]. "</td><td>" . $row["address"]. "</td><td>" . $row["bloodgroup"].

"</td><td>" . $row["town"]. "</td><td>" . $row["local"]. "</td><td>" . $row["state"].

"</td><td>" . $row["occupation"]. "</td><td>" .$row["phonenumber"];

echo '</td><td><a style="font-size:12px;" class="w3-btn w3-teal" href="sim_view2.php?

id='.$row['regstrationid'].'">View</a>';

echo '</td><td><a style="font-size:12px;" class="w3-btn w3-red" href="delete_sim2.php?

id='.$row['regstrationid'].'">Delete</a>';

} else {

54
print '

</table><div class="w3-panel w3-leftbar w3-light-grey">

<p class="w3-xlarge w3-serif">

<i><b>0</b> Record(s) found on DataBase</i></p>

</div>';

$conn->close();

?>

</table>

<footer class="w3-footer w3-amber">

<p style="text-align:center" Color:red> developed by Adun Endurance</p>

</footer>

55

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy