Parul University Project Online Voting System
Parul University Project Online Voting System
A PROJECT REPORT
Submitted by
BACHELOR OF TECHNOLOGY
in
INFORMATION TECHNOLOGY
PARULUNIVERSITY (PIET) i
ACKNOWLEDGEMENT
Behind any major work undertaken by an individual there lies the contribution of the
people who helped her to cross all the hurdles to achieve her goal.
I also express my deep sense of regards and thanks to Prof. Pooja Gupta, (Associate
Professor) and Head of INFORMATION TECHNOLOGY Engineering Department. I
feel very privileged to have had their precious advices, guidance and leadership.
Last but not the least, my humble thanks to the Almighty God.
PARULUNIVERSITY (PIET) ii
ACKNOWLEDGEMENT
Behind any major work undertaken by an individual there lies the contribution of the
people who helped her to cross all the hurdles to achieve her goal.
I also express my deep sense of regards and thanks to Prof. Pooja Gupta, (Associate
Professor) and Head of INFORMATION TECHNOLOGY Engineering Department. I
feel very privileged to have had their precious advices, guidance and leadership.
Last but not the least, my humble thanks to the Almighty God.
Behind any major work undertaken by an individual there lies the contribution of the
people who helped her to cross all the hurdles to achieve her goal.
I also express my deep sense of regards and thanks to Prof. Pooja Gupta, (Associate
Professor) and Head of INFORMATION TECHNOLOGY Engineering Department. I
feel very privileged to have had their precious advices, guidance and leadership.
Last but not the least, my humble thanks to the Almighty God.
PARULUNIVERSITY (PIET) iv
Team-id: PUIT_27 PU-OVS
ABSTRACT
The word “vote” means to choose from a list, to elect or to determine. The main
goal of voting (in a scenario involving the citizens of a given country) is to
come up with leaders of the people’s choice.
Some of the problems involved include ridging votes during election, insecure
or inaccessible polling stations, inadequate polling materials and also
inexperienced personnel.
This online voting/polling system seeks to address the above issues. It should be
noted that with this system in place, the users, citizens in this case shall be given
ample time during the voting period. They shall also be trained on how to vote
online before the election time.
INDEX
Content Page No.
CHAPTER 1 Introduction...................................................................4-7
1.1 Problem Statement...................................................................................5-5
1.2 Motivation................................................................................................6-6
1.4 Scope........................................................................................................7-7
CHAPTER 1 INTRODUCTION
1.1 Problem Statement
1.2 Motivation
1.3 Objective
1.4 Scope
1.2 MOTIVATION
1.3 OBJECTIVES
Validating the system to ensure that only legible voters are allowed to vote.
1.4 SCOPE
Less effort and less labor intensive, as the primary cost and focus
primary on creating, managing, and running a secure web voting portal.
[3] An Efficient Online Voting System: Online Voting System is a voting system
by which any Voter can use his/her voting rights from anywhere in the country.
It provides a detailed description of the functional and performance
characteristics of online voting system. Voter can cast their votes from
anywhere in the country without visiting to voting booths, in highly secured
way. That makes voting a fearless of violence and that increases the percentage
of voting.
[4] Electronic Voting: In “Electronic Voting”, Rivest addresses some issues like the
“secure platform problem” and the (im)possibility of giving a receipt to the
voter. He also provides some personal opinions on a host of issues including the
striking dissimilarity between e-commerce and e-voting, the dangers of
adversaries performing automated, wide-scale attacks while voting from home,
the need for extreme simplicity of voting equipment, the importance of audit-
trails, support for disabled voters, security problems of absentee ballots.
System
using cloud
and
identification Online - Malicious
software
programming
Voting
Platfor
m
offers
clever
tickets
,
brillia
nt
agend
a
highli
ghts,
vote
Parul University (PIET) 10
Team-id: PUIT_27 PU-OVS
counti
ng,
classif
ication
and
reveali
ng.
The
Online
Voting
Platfor
m
offers
clever
tickets
,
brillia
nt
agend
a
Parul University (PIET) 11
Team-id: PUIT_27 PU-OVS
highli
ghts,
vote
counti
ng,
classif
ication
and
reveali
ng.
The
Online
Voting
Platfor
m
offers
clever
tickets
,
brillia
Parul University (PIET) 12
Team-id: PUIT_27 PU-OVS
nt
agend
a
highli
ghts,
vote
counti
ng,
classif
ication
and
reveali
ng.
The
Online
Voting
Platfor
m
offers
clever
Parul University (PIET) 13
Team-id: PUIT_27 PU-OVS
tickets
,
brillia
nt
agend
a
highli
ghts,
vote
counti
ng,
classif
ication
and
reveali
ng.
-The Online
Voting Platform
offers clever
tickets, brilliant
agenda highlights,
vote counting,
classification and
revealing.
2 Highly Secured ISSN-2013 - personal - The usage of - Greater
identification number.
Online Voting online voting opportunity
has the for fraud or
Parul University (PIET) 14
Team-id: PUIT_27 PU-OVS
since not all people have free time during the given short period of time to
check and update the voter register.
3.1.1 WORKING
The system is built using water fall model, which consist of the requirement
analysis stage, the planning stage, the design stage, the coding stage and the
implementation stage. In our system we can implement a system which can
manage project cognate all work consummated by utilized and Project
coordinator or guide. Coordinator updates project cognate information, view
work done by a student at which time and view progress chart of work done by
student, progress chart is developed utilizing WBS (“Work Breakdown
Structure”). Student retrieved the given work information updates and
consummates this work at given time and submits into the project management
system.
Students has to register themselves in PU-PMMS, Unique registration
number and Team id will be generated, also student get conformation
mail from system.
HOD and Faculty will validate the team, grant permission or deny
permission on submitted definition, guides will be allocated to each team
and they mentoring their students periodically, students can contact with
their mentors at any time using this system, post their quires , also mentor
can contact with students any time.
Students need to submitted their PPR(periodic progress report) and Patent
Search & Analysis Report (PSAR).
3.1.3 DISADVANTAGES
It might be hard to adapt to all the changes of the project (the water
doesn’t flow upstream). Therefore, you need to be proactive to predict the
problems before they affect your flow. Communication is vital.
1) Login: - Using username and password Project coordinator login into system.
If authentication is failing Project coordinator cannot login into system.
2) Upload updates: - Project coordinator uploads and updates the project related
work.
3) Upload file: - Project coordinator upload file for student information.
4) View Files: - Project coordinator View all files uploaded by student.
5) View Gant Chart: - Project coordinator view Gant chart of student working.
Project Guide Module
1) Student Login: - Using username and password student login into system. If
authentication is failing student cannot login into system.
2) View updates: - Student views all updates of the work which uploaded by
Project coordinator or guide.
3) Upload file: - Student upload file and submit the completed work.
4) View Gant Chart: - Student view Gant chart of student working.
System analysis is conducted for the purpose of studying a system or its parts
in order to identify its objectives. It is a problem solving technique that
improves the system and ensures that all the components of the system work
efficiently to accomplish their purpose.
FACULTY:
STUDENT:
FACULTY:
STUDENT:
SEQUENCE DIAGRAMS:
ADMIN:
FACULTY:
STUDENT:
There are six basic processes in the following system and it is also having
some sub processes. All the processes can be clearly understood by
understanding of the Data Flow Diagram
External Entity:
A source or destination of data, which is external to the system. E.g. Student etc.
Data flow:
It is packet of data. It may be in the form of document, letter etc.
Data store:
Any store data but with no reference to the physical method of storing.
DFD level0
Active data dictionaries. These are data dictionaries created within the
databases they describe automatically reflect any updates or changes in their
host databases. This avoids any discrepancies between the data dictionaries
and their database structures.
Passive data dictionaries. These are data dictionaries created as new
databases -- separate from the databases they describe -- for the purpose of
storing data dictionary information. Passive data dictionaries require an
additional step to stay in sync with the databases they describe and must be
handled with care to ensure there are no discrepancies.
DATA DICTIONARY
9. Table name:UserType_master
Primary key: Id
Foreign key: References:
FIELDNAME DATATYPE SIZE CONSTRAINT DESCRIPTION
Id int 20 Primary key. Id
User Type Varchar2 50 - User’s Type
Added on datetime - - -
Updated on datetime - - -
Is Active bit - - -
This phase is actually a base for the whole development effort. Here we
meet the prospective users of the system and analyse the features they demand.
A comprehensive understanding of the user’s needs and writing down features
of the proposed software product are the keys to success in this phase. Lack of
the understanding will affect both the programmer and the user.
Parul University (PIET) 44
Team-id: PUIT_27 PU-OVS
Back end
Microsoft SQL server 2008.
About ASP.NET:
Features of C# :
The classes and data types are common to all of the .NET languages.
SQL Server :
3.4.3 CONSTRAINTS
Parul University (PIET) 46
Team-id: PUIT_27 PU-OVS
Regulatory Policies
The only rule to use the software is that the system is so user friendly that
no other regulations can be imposed on the client.
This phase of the software development process deals with a brief study
of different hardware used in the computerized system. All the hardware needed
here are generally the basic configuration of a typical office computer. A list of
the hardware requirement used in the system given below:
Minimum Configuration:
To run the application software of the system in the computer the minimum
configuration required is as below:
CHAPTER 4 IMPLEMENTATION
4.1 Back end Technology
4.2 Front end Technology
4.3 Sanpshots
The .NET Web Application looks like a Google Assistant. But this application is a
more feature and new concept used. Users can customization feature used.
4.3 SNAPSHOTS
Registration Page
Login Page
Add PPR:
View PPR:
Add PPT :
View PPT:
Add PSAR1:
View PSAR1:
Add PSAR2:
View PSAR2:
Add PSAR3:
View PSAR3:
Plagiarism check:
Certificate Generation:
1. FirstName
2. Confirm Password
3. LastName
4. Address
5. UserName
6. PhoneNumber
7. Email ID
8. Gender
9. Password
1. Email ID
2. UserName
3. Password
4. Confirm Password
1. Email
2. Password: It should have alphanumeric, Length should be 8 to 32.
3. PhoneNumber: Phone Number should have only Numbers, Country
code is required
Test
Test Data /
Sr No. Case Feature Description Steps To Execute Expected Results
Input
s
Check all the text
1. Click on Radio
TC- User boxes, radio
1 buttons, buttons and N/a UI should be perfect
001 Interface buttons, buttons,
dropdowns
etc
Check the 1. Do not enter any
It should show a
TC- Required required fields by value in the field.
2 N/a mandatory symbol (*) on
002 fields not filling any 2. Click on the
mandatory fields.
data Register button.
1. Users should be
1. Enter valid registered
Check user
values in the successfully.
TC- Required should Register
3 required fields. N/a 2. A successful
003 fields by filling all the
2. Click the registration message
required fields
Register button. should show.
3. Mail should send to the
user
1. It should not ask to fill
1. Do not enter any the optional fields
detail in optional 2. User should be
Check all the
fields registered successfully
TC- Optional optional fields
4 2. Enter valid data N/a 3. A successful
004 Fields when do not fill
in required fields registration message
data
3. Click on the should show
Signup button 4. Mail should send to the
user
1. User should be
1. Enter valid data
registered successfully
in optional fields
Check all the 2. A successful
TC- Optional 2. Enter valid data
5 optional fields N/a registration message
005 Fields in required fields
when filling data should show
3. Click on the
3. Mail should send to the
Register button
user
• Check the
Email text field 1.testAtgmail
that has an Email 1. Enter Invalid .com
It should show the
TC- Email address without Emails 2.test@gmail
6 validation message for
006 validation @ symbol. • 2. Click on the com
valid email
Check the Email Register Button. 3.test@gmail
text field that has 4.@gmail
a random string
Test
Test Data /
Sr No. Case Feature Description Steps To Execute Expected Results
Input
s
instead of a real
email. • Check
the Email text
field that has @
symbol written in
words. • Check
the Email text
field that has a
missing dot in
the email
address.
1. Enter valid 1.test.22@g
TC- Email Check all the Emails mail.com It should not show any
7
007 validation valid emails 2. Click on the 2.test@gmail validation message
Register Button. .com
Check the phone 1. Enter
Phone number when alphanumeric data 1. It should show the
TC-
8 Number passing in phone field dada5$7567# validation message 8 for
008
validation alphanumeric 2. Click on Register 7 Phone Number
data button
1. Enter valid phone
Check the phone
Phone number without It should show the
TC- number when not 1.
9 Number country code validation message for
009 pass country 9012078654
validation 2.Click on Register country code is required
code
button
1. Enter valid phone
Check the phone
Phone number with 1.
TC- number when It should not show any
10 Number country code +919011224
010 passing country validation message
validation 2.Click on Register 4
code
button
1. Enter value
Check the which is
TC- Password password limit alphanumeric but It should show validation
11 1. Password
011 Validation when enter value less than 8. message
less than min 2.Click on Register
button
1. Enter
Check the
alphanumeric value Any Random
TC- Password password limit It should show validation
12 but more than 32. string with
012 Validation when enter value message
2.Click on Register numbers
greater than max
button
1. Enter a value in
Check the
numbers which is in
TC- Password password when It should show validation
13 between 8-32 1. 12345678
013 Validation passing only message
2.Click on Register
numbers
button
Test
Test Data /
Sr No. Case Feature Description Steps To Execute Expected Results
Input
s
1. Enter value in
Check the
alphanumeric which
TC- Password password when 1. It should not show any
14 is in between 8-32
014 Validation passing valid Pass123456 validation message
2.Click on Register
data
button
1. Go to the Site.
Those Blank spaces
2. Passed blank
Verify if blank should trim and
TC- Required spaces in required
15 spaces are passed N/a Validation error message
015 Fields fields.
in required fields. for required fields should
3. Click on the
visible.
Register button
User should get a
Verify user can 1. Go to the Email.
TC- Required test22@gmai verification link and able
16 verify its Email 2. Click on the
016 Fields l.com to verify his/her Email
ID verification link.
ID.
1. Enter phone
Verify if the number less than 10
Phone length of the digits. It should show the
TC-
17 Number phone number is 2.Enter all required 91901122 validation error message
017
Validation incorrect i.e. less fields. for phone number length.
than 10. 3.Click on Register
Button
1. Enter phone
Verify if the number less than 10
Phone length of the digits. It should show the
TC- 9190112244
18 Number phone number is 2.Enter all required validation error message
018 5566
Validation incorrect i.e. fields. for phone number length.
more than 10 3.Click on Register
Button
1. Enter the
Verify if the
password which not
password
TC- Password satisfies the
19 required rules are passw
019 Validation required rule.
not satisfied in
2.Click on Register
the password
button
Sr Test
Feature Description Steps To Execute Expected Results
No. Cases
Check all the text
User • UI should be perfect • Text boxes
1 TC-01 boxes and Check Page
Interface and button should be aligned
buttons
1. Enter invalid
Required Check the User should not log in and should show
2 TC-02 username
Fields required fields proper error message
2. Enter correct
Sr Test
Feature Description Steps To Execute Expected Results
No. Cases
by not filling any password
data. 3. Click on Login
Button
1. Enter valid
Check When username
passing a correct 2. Enter incorrect User should not log in and should show
3 TC-03 User Login
username and password proper error message
invalid password 3. Click on Login
Button
1. Enter valid
username
User Check Keeping 2. Do not enter User should not log in and should show
4 TC-04
Interface Password password proper error message
3. Click on Login
Button
1. Enter valid
username
Check when pass
2. Enter valid
5 TC-05 User Login correct email and User should log in
password
password
3. Click on Login
Button
1. Enter valid
Check if the
username
password is
6 TC-06 User Login 2. Enter password Password is entered in encrypted form
entered in
3. Click on Login
encrypted
Button
Check whether
Signup
the signup link Clicking signup link takes the user to
7 TC-07 Option for Click Signup link
for the new user signup page successfully
new users
is working
Verify user
should get an 1. Click on the Forgot
error message password link.
Forgot
8 TC-08 when he/she 2. Enter unregistered User should get an error message.
Password
enters not email id and click on
registered email the send button.
id.
Verify user
1. Go to the reset
should get an
password link.
error message
Reset 2. Enter the previous
9 TC-09 when he/she User should get an error message.
Password password.
enters the
3. Click on the Reset
previous
Password button.
password.
1. Go to the reset
Verify user able
Reset password link. Users should get the success message
10 TC-10 to reset his/her
Password 2. Enter a new and the password should get reset.
password
password and a
Sr Test
Feature Description Steps To Execute Expected Results
No. Cases
confirm password.
3. Click on the Reset
Password button.
Verify user 1. Go to the reset
should get an password link.
error message 2. Enter a different
Reset
11 TC-11 when password new password and a Users should get an error message.
Password
and confirm confirm password.
password not 3. Click on the Reset
matches Password button.
1. Go to the reset
password link.
2. Enter a new
Verify user
password and a
Reset should able to
12 TC-12 confirm password. User should able to login
Password login with a new
3. Click on the Reset
password.
Password button.
4. Log in by using the
new password.
Verify if the user
enters a new 1. Go to the reset
password that password link.
does not cover 2. Enter a new
Reset the basic password that does
13 TC-13 Users should get an error message.
Password requirements of not cover the basic
password then requirements.
the user should 3. Click on the Reset
be displayed Password.
error message
1. Go to the Site.
Verify if blank 2. Passed blank
Those Blank spaces should trim and
Required spaces are passed spaces in required
14 TC-14 Validation error message for required
Fields in required fields.
fields should visible.
fields. 3. Click on the Login
button
Verify new users
should get the
Welcome 1. Go to the Email. Users should get a welcome email on
15 TC-15 welcome email
Email 2. Enter Login Email. his/her email id.
once after the
login.
1. Enter incorrect
Verify when Email.
passing incorrect 2. Enter the correct User should not be able to log in and
16 TC-16 User Login
Email and password. the error message should be displayed.
correct password 3. Click on the Login
Button.
Verify when 1. Enter incorrect User should not be able to log in and
17 TC-17 User Login
passing both Email. the error message should be displayed.
Sr Test
Feature Description Steps To Execute Expected Results
No. Cases
incorrect Email 2. Enter the correct
and password password.
3. Click on the Login
Button
1. Click on the Forgot
Password link.
Verify Forgot 2. Enter Email and
User
Password sends a click on the send User should get the forgot password
18 TC-18 Forgot
forgot password button. link on his/her email id.
Password.
link. 3. Now go to mail7.io
and enter the email
id.
CONCLUSION
Work Flow
7th semester
No. Description Start End Date Duration
Date
1 Literature 21/06/20 05/07/20 15 days
8th semester
No. Description Start End Date Duration
Date
1 Login 30/10/20 12/11/20 12 days
Registration
page
REFERENCES
[10] D. Darmawan, “No Title No Title,” J. Chem. Inf. Model., vol. 53, no. 9,
pp. 1689–1699, 2019, doi: 10.1017/CBO9781107415324.004.