Ebot Prince Peter Tambe
Ebot Prince Peter Tambe
OF AN AUTOMATED ID CARD
SYSTEM
EBOT PRINCE PETER TAMBE
Speciality : SOFTWARE
ENGINEERING
Matricule:23IU41762
Level:2
STRUCTURE OF REPORT
GENERAL INTRUDUCTION
INTERNSHIP FRAMEWORK
EVALUTION OF INTERNSHIP ACTIVITIES
PROJECT FRAMEWORK
LITERATURE REVIEW,MATERIALS AND METHODS
DESINING UML DIAGRAMS
RESULTS AND DISCUSSION
RESEARCH QUESTIONS
How does an automated ID card system improve
efficiency compared to manual methods?
What security features can be integrated into an
automated ID card system to prevent fraud?
What are the challenges organizations face when
implementing an automated ID card system?
How does automation impact the cost and scalability
of ID card management?
What measures can be taken to ensure data accuracy
and security in an automated ID card system?
BRIEF PRESENTATION OF PEFSCOM
PEFSCOM SYSTEM is a technology and software development and
consultancy firm which began in December 2014 in BUEA south west
region Cameroon. The firm set the ball rolling
With the development of minor education/school management software for
primary school and secondary schools. And also, PEFSCOM SYSTEM at that
time began with very little capital mainly from the founder and CEO MR
FRANKLINE EKOMBE MBUA and with just about five staffs.
For about 2 years now, the activities of the consultancy have slowed down
as the firm became more and more involved in the world of software
development for bigger organisations.
In April 2024, an extension of PEFSCOM came into lamplight, with a branch
in Bonaberi-Douala with MR. ASONGAFACK PATRICK LYONGA appointed
as Director General and EFUETLEFEH JOSHUA the Assistant Director
General
LITERATURE REVIEW
Conceptual Framework
Definition of Terms
Task Management – The process of organizing, tracking, and
prioritizing tasks to enhance productivity and efficiency.
Desktop Application – A software program designed to run on a
computer's operating system rather than a web browser.
Graphical User Interface (GUI) – A visual interface that allows
users to interact with software using icons, buttons, and windows.
User Authentication – A security process that verifies a user's
identity before granting access to the application.
Local Database – A database stored on a user's computer rather
than on a remote server, used for managing application data.
Dashboard – A visual representation of the various components of
the application which will enable the users to interact with the
system effectively.
BACKGROUND OF STUDY
Identification (ID) cards play a crucial role in various organizations, including educational
institutions, corporations, and government agencies. Traditional ID card issuance and
management systems are often manual, time-consuming, and prone to errors such as
duplication, loss, and delays in processing. These inefficiencies create security
vulnerabilities and administrative burdens.
To address these challenges, automated ID card systems have been developed to
streamline the process of ID card generation, issuance, and authentication. An automated
system integrates technologies such as databases, biometric verification, QR codes, and
RFID (Radio Frequency Identification) to enhance security and efficiency. It allows users to
apply for, renew, and validate ID cards digitally, reducing human intervention and
improving data accuracy.
The adoption of automated ID card systems is particularly beneficial for institutions that
handle a large volume of users, as it minimizes paperwork, enhances security, and speeds
up the identification process. As technology continues to evolve, these systems are
becoming more sophisticated, integrating artificial intelligence (AI) and block chain for
improved data security and fraud prevention.
This study explores the development and implementation of an automated ID card system,
highlighting its advantages over traditional methods, the challenges faced in adoption, and
PROBLEM STATEMENT
Time-Consuming Processes – The manual creation, verification,
and distribution of ID cards take significant time, causing delays in
onboarding new employees, students, or members.
Human Errors – Manual data entry increases the likelihood of
mistakes in personal information, which can lead to incorrect
identifications and the need for costly corrections.
Security Risks – Physical ID cards without advanced security
features are susceptible to forgery, loss, or unauthorized
duplication, posing security threats to organizations.
Data Management Challenges – Storing, updating, and retrieving
ID card records manually can lead to disorganization, making it
difficult to track individuals and their access rights.
Limited Scalability – As institutions grow, manual ID card
management becomes increasingly difficult to handle, leading to
inefficiencies in large organizations.
DIAGRAM
Requirement
analysis
Deployme
nt
Architectural
SDLC Design
Testing
Software
Developmen
Figure 1:System Development Life Cycle t
RESULT
Figure 3: Dashboard
RECOMENDATIONS
Integrate biometric authentication
(fingerprint/face recognition) for
enhanced security
Partner with government agencies
and institutions for wider adoption
DIFFICULTIES
ENCOUNTERED
❖ Technical Issues
• I had limited knowledge in programming languages
since I had limited knowledge in them
• I faced difficulties in deburbing errors but I later
adapter
❖ Social Issues
• While at PEFSCOM there was a problem of power
failure which was
Later adjusted
• As the team head, I found difficulties in coordinating
my team mates
In preparing for the our presentation
CONCLUSION
The automated ID card system enhances
efficiency, accuracy and security in
identity management. It reduces manual
errors, speeds up processing, and
minimizes identity fraud risks. This
system is reliable and adaptable, making
it suitable for various organizations,
ultimately improving user and
administrative experiences.