Online Voting System For College Elections: Project Report (Paper-410)
Online Voting System For College Elections: Project Report (Paper-410)
Online Voting System For College Elections: Project Report (Paper-410)
CERTIFICATE
ACKNOWLEDGEMENT
TABLE OF CONTENTS
Acknowledgement
1. INTRODUCTION
2. REQUIREMENT ANALYSIS
3. PROJECT MANAGEMENT
4. DESIGN ENGINEERING
5. SOFTWARE TESTING
6. REFERENCES
5|Page
1. INTRODUCTION
As the statistics shows that the percentage of polling on the day of elections is not satisfactory as
majority of students are not coming to vote and thinks is just as a wastage of time.
The manual voting system takes long time as there is a lot of paper work first and then human
effort is also there for counting of the votes.
Manual voting consumes almost 4-6 hrs (approx.) of every voter which is surely a headache.
The voting of the college elections will be done online such that there is no need to come at the
college on the time of elections and the student can vote from the home or from any other place.
A USER ID and PASSWORD will be provided to every student of the college, so that on the time
of elections they can easily login on the election link and can use his/her vote.
6|Page
A process model for software engineering is choosen based on the nature of the project and
application, the methods and tools to be used, and the controls and deliverables that are required.
The model is used to build the ―ONLINE VOTING SYSTEM‖
software is ―The Prototyping Model‖. The prototyping paradigm is: - ―Water fall model‖
1.Requirement Analysis
2.Design
3.Implementation
4.Testing
5.Maintenance
Advantages:
2. REQUIREMENT ANALYSIS
The basic function of requirement analysis is that it translates the ideas in the mind of the clients
into a formal document. Thus the output of this phase is a set of precisely specified requirements
which are complete and consistent. This document is called Software Requirement Specification.
In order to provide the user with a feeling of community, the following requirement should be
taken care:
Each user will have to create their own profile that they can log into each time they visit the
site.
If the user does not create or log in to an account they will only be able to browse
questions on the site, they will not be able to use any of the sites other functionalities.
In order to create an account the user must have a college email address (verified by
server).
Once they create an account the user will be able to Log in and out of the system, Upload a
picture, choose their status (i.e. Student, TA, Professor).
Upload information about themselves (name, AIM, college email, hobbies, etc.)
Select a college and area of study.
View and send private messages to other users through a custom messaging client.
Questions and Answer functionality: Users will be able to post new questions, able to answer
questions and post sources for their answers, search for questions containing key words, thumbs up
and thumbs down questions and responses Users can bookmark questions, send questions to
friends.
A data flow diagram is a graphical representation that depicts information flow and the transforms
that are applied as data move from input to output.
The basic form of a data flow diagram, also known as a data flow graph or a bubble chart, The data
flow diagram may be used to represent a system or software at any level of abstraction.
As information moves through software, it is modified by a series of transformations. A data flow
diagram is a graphical representation that depicts information flow and the transforms that are
applied as data move from input to output. The basic form of a data flow diagram, also known as a
data flow graph or a bubble chart. DFD is an abstract description of the system. The data flow
diagram may be used to represent a system or software at any level of abstraction.
DFDs may be partitioned into levels that represent increasing information flow and functional
detail. Therefore, the DFD provides a mechanism for functional modeling as well as information
flow modeling. DFDs are very useful in understanding a system and can be effectively used during
analysis.
DFDs can be hierarchically organized, which helps in progressively partitioning and analyzing
large systems. Such DFDs are called leveled DFDs. Context diagram is a diagram in which the
entire system is treated as a single process and all its inputs, outputs, sinks, and sources are
identified and shown.
8|Page
COLLEGE
DATABASE COLLEGE
STUDENT DETAILS VOTING
DATABASE
VOTER Authentication
AUTHENTICATION
successful
VOTING
LOG IN
PROCESS
Username/ Voting
password done
unsuccessful
HOME
LOG OUT
PAGE
Receipt
USER USER
Username = Name|Digit
Name = First + Middle + Last
First = [a|b|c_ _ _ _ _ _ _|z|A|B|C_ _ _ _ _ _|Z]*
Middle = [a|b|c_ _ _ _ _ _ _|z|A|B|C_ _ _ _ _ _|Z]*
Last = [a|b|c_ _ _ _ _ _ _|z|A|B|C_ _ _ _ _ _|Z]*
Digit=[0|1|2|3|_ _ _ _ _ |9]*
Successful = Done
Unsuccessful = Not Done
Authenticated = Done
Status = Yes/No
Receipt = [Code] + digit + digit + digit + digit + Name
Password = [word] | digit
Word = [0|1|2|3|_ _ _ _ _|9]*
3. PROJECT MANAGEMENT
Project management involves the planning, monitoring, and control of the people, process, and
events that occur as software evolves from a preliminary concept to an operational
implementation. Project managers plan, monitor, and control the work of a team of software
engineers. Effective software project management focuses on the four P‟ s: people, product,
process, and project.
Function-oriented software metrics use a measure of the functionality delivered b y the application
as a normalization value. Since, ―functionality‖ cannot be measured directly; it must be derived
indirectly using other direct measures. Function points are computed by completing the table 4.1.
Five information domain characteristics are determined and counts are provided in the appropriate
table location. Information domain values are defined in the following manner:
Number of user inputs:Each user input that provides distinct application oriented data to the
software is counted. Inputs should be distinguished from inquiries, which are counted separately.
Number of user outputs: Each user output that provides application oriented information to the
user is counted. In this context output refers to reports, screens, error messages, etc. Individual data
10 | P a g e
Number of files: Each logical master file (i.e., a logical grouping of data that may be one part of a
large database or a separate file) is counted.
Number of external interfaces:All machine readable interfaces (e.g., data files on storage media)
that are used to transmit information to another system are counted.
Count total 54
14. Is the application designed to facilitate change and ease of use by the user?
Once these data have been collected, a complexity value is associated with each count.
Organizations that use function point methods develop criteria for determining whether a particular
entry is simple, average, or complex. To compute function points (FP), the following relationship
is used:
FP = count total *[0.65 + 0.01 *Σ (Fi)]
= 54*(0.65 + 0.01*51)
=54*1.16
=62 (approx.)
Where count total is the sum of all FP entries obtained from Figure.
Barry Boehm introduced a hierarchy of software estimation models bearing the name COCOMO,
for COnstructive COst MOdel. The original COCOMO model became one of the most widely used
and discussed software cost estimation models in the industry. The COCOMO II application
composition model uses object points.
The object point is an indirect software measure that is computed using counts of the no. of screens
(user interface), reports and components likely to be required to build the application. Each object
instance is classified into one of three complexity levels using criteria suggested by Boehm.
Once complexity is determined, the number of screens, reports, and components are weighted. The
object point count is then determined by multiplying the original number of object instances by the
weighting factor in and summing to obtain a total object point count. When component-based
development or general software reuse is to be applied, the percent of reuse (%reuse) is estimated
and the object point count is adjusted:
NOP = (object points) x [(100 -%reuse)/100],
where NOP is defined as new object points.
To derive an estimate of effort based on the computed NOP value, ―productivity rate‖ must be
derived.
PROD = NOP/person-month
Table 3.1 presents the productivity rate for different levels of developer experience and
development environment maturity. Once the productivity rate has been determined, an estimate of
project effort can be derived as
Estimated effort = NOP/PROD
E= (equation 1)
2=
4
t =0.06
A table provides a project manager with a simple technique for risk production. A risk table is
sorted by probability and impact to rank risks. A project team begins by listing all risks in the 1st
column of the table. This can accomplished with the help of the risk item checklist referenced.
Each risk is categorized in the 2nd column. The probability of occurrence of each risk is entered in
the next column of the table.
Next, the impact of each risk is assessed. Each risk component is assessed using the
characterization presented and an impact category is determine. The categories for each of the four
risk components-performance, support, cost and schedule-are averaged to determine an overall
impact value.
13 | P a g e
Once the first four columns of the risk table have been completed, the table is sorted by probability
and by impact. High-probability, high-impact, risk-impact risks percolate to the top of the table and
low-probability risks drop to the bottom.
When creating a software project schedule, the planner begins with a set of task. If automated tools
are used, the work breakdown is input as a task network or task outline. Effort, duration, and start
date are then input for each task. In addition, tasks may be assigned to specific individuals. A
14 | P a g e
timeline chart, also called a Gantt chart, is generated. A timeline chart can be developed for the
entire project.
Timeline depicts a part of a software project schedule that emphasizes. All project tasks are listed
in the left-hand column. The horizontal bars indicate the duration of each task. When multiple bars
occur at the same time on the calendar, task concurrency is implied. The diamonds indicate
milestones. Once the information necessary for the generation of a timeline chart has been input,
the majority of software project scheduling tools produce project tables—a tabular listing of all
project tasks, their planned and actual start- and end-dates, and a variety of related information.
4. DESIGN ENGINEERING
The design of a system is essentially a blueprint or a plan for a solution for the system. A design
methodology is a systematic approach to creating a design approach, a system is viewed as a
transformation function, transforming the inputs to the desired outputs.
The design process for software systems often has two levels. At the first level the focus is on
deciding which modules are needed for the system, the specifications of these modules, and how
the modules should be interconnected. This is what is called the system design or top-level design.
In the second level, the internal design of the modules, or how the specifications of the module can
be satisfied, is decided. This design level is often called design to contain a more detailed
descriptionof the processing logic and data structures so that the design is sufficiently complete for
coding.
COLLEGE
DATABASE COLLEGE
STUDENT DETAILS VOTING
DATABASE
VOTER Authentication
AUTHENTICATION
successful
VOTING
LOG IN
PROCESS
Username/ Voting
password done
unsuccessful
HOME
LOG OUT
PAGE
Receipt
USER USER
4.1.2 Identify the Most Abstract Input(MAI) and Most Abstract Output(MAO)
Data Elements
The most abstract input (MAI) data elements are those data elements in the data flow diagram that
are farthest removed from the physical inputs
but can still be considered inputs to the system. The most abstract input data elements often have
little resemblance to the actual physical data.
Most abstract output data elements (MAO) by starting from the outputs in the data flow diagram
and travelling toward the inputs. These are the data elements that are most removed from the actual
outputs but can still be considered outgoing. The MAO data elements may also be considered the
logical output data items, and the transforms in the data flow diagram after these data items are
basically to convert the logical output into a form in which the system is required to produce the
output.
17 | P a g e
COLLEGE
COLLEGE DATABASE.
DATABASE.
VOTING DETAILS
STUDENT DETAILS
MOST
ABSTRACT MOST
INPUT ABSTRACT
OUTPUT
VOTER Authentication
AUTHENTICATION
successful
VOTING
LOG IN
PROCESS
Username/ Voting
password done
unsuccessful
HOME
LOG OUT
PAGE
Receipt
USER USER
We first specify a main module, whose purpose is to invoke the subordinates. The main module is
therefore a coordinate module. For each of the most abstract input data items, an immediate
subordinate module to the main module is specified. Each of these modules is an input module,
whose purpose is to deliver to the main module the most abstract data item for which it is created.
Similarly, for each most abstract data item, a subordinate module that is an output module that
accepts data from the main module is specified. Each of the arrows connecting these input and
output subordinate modules is labelled with the respective abstract data item flowing in the proper
direction. Finally, for each central transform, a module subordinate to the main one is specified.
These modules will be transform modules, whose purpose is to accept data from the main module,
and then return the appropriate data back to the main module. The data items coming to a
transform module from the main module are on the incoming arcs of the corresponding transform
in the data flow diagram.
18 | P a g e
ONLINE VOTING
SYSTEM
candidates
ls Ge
tai tr
List of
de ec
vote
eip
t
VOTING CONFIRMATION
LOGIN
PROCESS STATUS
The first-level factoring results in a very high level structure, where each subordinate module has a
lot of processing to do. To simplify these modules, they must be factored into subordinate modules
that will distribute the work of a module. Each of the input, output and transformation modules
must be considered for factoring. A subordinate input module is created for each input data stream
coming into this new central transform, and a subordinate transform module is created for the new
central transform. The new input modules now created can then be factored again, untill the
physical inputs are reached. The factoring of the output modules is symmetrical to the factoring of
the input modules.
The goal is to determine sub transforms that will together compose the overall transform and then
repeat the process for the newly found transforms, until we reach the atomic modules.
LOGIN
ils t
Username/
ta en
Password
Au
de stud
details
th
en
t
Ge
tic
at
ed
Username/
Details Authentication
password
Voting Process
V
s ot
t ca ele e fo
lis nd cte r
id d
at
es
CONFIRMATION
STATUS
Ge
te
tr
vo
ec
eip
t
SUCCESSFULLY
STATUS
VOTED
Data Design translates the data objects defined in the analysis model into data structure that reside
within the software. The attributes that describe the object, the relationship between data objects
and their use within the program all influence the choice of data structures. At a higher level of
abstraction, data design may lead to the definition of the architecture for a database or a data
warehouse.
20 | P a g e
NAME
First Name Char 20
Second Name Char 20
Last Name Char 20
FATHER‘S NAME
First Name Char 20
Second Name Char 20
Last Name Char 20
ADDRESS Char 50
SEX Char 1
PASSWORD Char 10
AGE Int 2
COURSE Char 20
USERNAME Char 20
USERNAME Char 20
PASSWORD Char 20
STUDENT
First Name Char 20
Second Name Char 20
Last Name Char 20
USERNAME Char 20
PASSWORD Char 10
Component-level design establishes the algorithm detail required to manipulate data structures,
effect communication between software components via their interfaces, and implement the
processing algorithms allocated to each component. Component-level design, also called
procedural design, occurs after data, architectural, and interface
designs have been established. The intent is to translate the design model into operational software.
But the level of abstraction of the existing design model is relatively high, and the abstraction level
of the operational program is low.
PSEUDOCODE:
OVS homepage_Load()
{
DBconnection.Open
Button Login.enable = true
Button Logout.enable = true
}
Button Login_click()
{ Flag =false
Username =InputBox(―Enter Your Name‖)
Password =InputBox(―Enter Your Password‖)
DBStudent_Details.MoveFirst
Do while DBStudent_Details.EOF=false
{ if
DBStudent_Details.Feilds(―Username‖)<>UsernameAnd
DBStudent_Details.Feilds(―Password‖)<>Password
then
DbStudent_Details.MoveNext
Else
22 | P a g e
flag =true
EXIT do
End if
}Loop
if
flag =false
then
MsgBox(―Username or Password is not correct‖)
End if
if
flag =true
then
MsgBox(―Login as voter successful‖)
Voting Process()
End if
}
Voting Process_Load()
{ count_president1= 0
count_president2=0
count_president3=0
count_Vice_president1=0
count_Vice_president2=0
―Please select one candidate from each category‖
{―President Candidate:-‖
if Radiobutton.1=true then
{ President =1
count_president1++
}
else if Radiobutton.2=true then
President=2
count_president2++
}
else if Radiobutton.3=true then
{
President=3
count_president3++
}
End if
{
Vice president =2
count_Vice_president2++
}
End if
Button Save_click()
{
DBVoting_Details.Feilds(―President‖) =President
DBVoting_Details.Feilds(―Vice President‖) =Vice President
}
MsgBox(―Voted Successfully‖)
}}
Button Logout_click()
{ unload OVShomepage
End
}
If(count_Vice_president1> count_Vice_president2)
{
MsgBox(―Selected Vice President is ‖, Vice president 1)
}
Else
{
MsgBox(―Selected Vice President is ‖, Vice president2 )
}
End if
5. TESTING
24 | P a g e
Testing is the process of running a system with the intention of finding errors. Testing enhances the
integrity of a system by detecting deviations in design and errors in the system. Testing aims at
detecting error-prone areas. This helps in the prevention of errors in a system. Testing also adds
value to the product by conforming to the user requirements.
The main purpose of testing is to detect errors and errorprone areas in a system. Testing must be
thorough and well-planned. A partially tested system is as bad as an untested system. And the price
of an untested and under-tested system is high.
The implementation is the final and important phase. It involves user-training, system testing in
order to ensure successful running of the proposed system. The user tests the system and changes
are made according to their needs. The testing involves the testing of the developed system using
various kinds of data. While testing, errors are noted and correctness is the mode.
5.1 FLOWGRAPH
3 4
9 10
11
12
Cyclomatic complexity is a software metric that provides a quantitative measure of the logical
complexity of a program.
In figure, the cyclomatic complexity can be computed by using the algorithm.
1. The number of regions correspond to the cyclomatic complexity
The flow graph has three regions.
2. Cyclomatic complexity , V(G), for a flow graph, G is defined as
V(G)=E-N+2 (where E= no. of edges, N= nodes)
V(G)=13 edges – 12 nodes + 2
V(G)= 3
3. Cyclomatic complexity, V(G), for a flow graph G, is also defined as
V(G)=P+1= 2+1= 3
REFERENCES
● Software Engineering- A practitioner's Approach by Roger S. Pressman: 6th edition
McGraw Hill, 2005