0% found this document useful (0 votes)
75 views35 pages

HASSAN

The document discusses implementing an online voting system (OVS) as an alternative to the traditional paper-based voting method. Some key issues with the current system include it being expensive, time-consuming, prone to errors during data entry and vote counting. The OVS aims to address these problems by providing a cheaper and more efficient electronic voting process that reduces queues and allows voters to cast their ballot from anywhere via the internet. However, security concerns around online voting also exist, such as the risk of hackers interfering with the voting system. The objectives of the OVS project are to review the existing voting process, develop an automated online voting framework, and validate the system to ensure only eligible voters can participate.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views35 pages

HASSAN

The document discusses implementing an online voting system (OVS) as an alternative to the traditional paper-based voting method. Some key issues with the current system include it being expensive, time-consuming, prone to errors during data entry and vote counting. The OVS aims to address these problems by providing a cheaper and more efficient electronic voting process that reduces queues and allows voters to cast their ballot from anywhere via the internet. However, security concerns around online voting also exist, such as the risk of hackers interfering with the voting system. The objectives of the OVS project are to review the existing voting process, develop an automated online voting framework, and validate the system to ensure only eligible voters can participate.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 35

Abstract

Over the last few years, there have been a number of election observers who have suggested
introducing electronic voting election processes. A general observation is that as more
business is done using electronic mediums, it should not be difficult to carry out voting using
electronic equipment rather than turning up at the polling place on voting day to use paper
and pen. The Online Voting System (OVS) under implementation mainly addresses the
voting phase. Electronic voting using the OVS should be cheaper than the present paper
based arrangement. The phenomenal use of the Internet as a vehicle for improving
communication, access to information and electronic commerce has led to the claim that the
Internet could be used as either a replacement to attendance voting or as an additional voting
option. Throughout history, election fraud has occurred in many electoral processes from
which experience shows that the manual voting process is a major source of such vices and
violence in many Organizations.

The mechanism leading to fraud is manifested in registration places by corrupt officials who
are in a position to issue voter registration data capture forms to illegitimate individuals, stuff
ballot boxes, invalidate registration for opposition voters or even coerce voters. Therefore
OVS shall reduce the time spend making long queues at the polling stations during voting. It
shall also enable the voters to vote from any branch of the globe since this is an online
application available on the internet. Cases of vote miscounts shall also be solved since at the
backend of this system resides a well-developed database using MYSQL that can provide the
correct data once it’s correctly queried. Since the voting process shall be open as early as
possible, the voters shall have ample time to decide when and whom to vote for.

i
CONTENT
CHAPTER PARTICULARS PAGE
Certificate (i)
Company Certificate (ii)
Declaration (iii)
Acknowledgement (iv)
Contents (v)
List of Tables (vi)
List of Figures/Charts (vii)
List of Abbreviations & Appendix (viii)
Executive Summary / Abstract
1 INTRODUCTION
1.1 Introduction to the Research Study
1.2 Background of the Research Study
1.3 Aim and Objectives
1.4 Problem Statement
1.5 Scope & Limitation
1.6 Significance of the Study
1.7 Motivation
1.8 Outline of the Research
2 LITERATURE SURVEY
2.1 Introduction
2.2 Literature related to the Topic
2.3 Literature related to the Method & Results
2.4 Research Gaps
2.5 Summary of the Literature Reviewed
3 METHODOLOGY
3.1 Methodology

ii
3.2 Selection of Method/ Data/ Algorithms
3.3 Experimental Project & Research Study
3.4 Implementation of Project
3.5 Testing Methods
4 SUMMARY OF RESULTS
4.1 Results
4.2 Comparison of Results
4.3 Suggestions/Recommendation
5 CONCLUSION, SUMMARY & FUTURE WORK
5.1 Summary
5.2 Conclusion
5.3 Future Enhancements
REFERENCES
APPENDICES
I Plagiarism Report
II Work Plan
III Software Requirements and Design Document (if any)

iii
CHAPTER ONE

INTRODUCTION

1.1 Background

The Online voting system (OVS) also known as e-voting is a term encompassing several different

types of voting embracing both electronic means of counting votes. Electronic voting technology can

include punched cards, optical scan voting systems and specialized voting kiosks (including self-

contained direct-recording electronic voting systems or DRE). It can also involve transmission of

ballots and votes via telephones, private computer networks, or the internet.

Online voting is an electronic way of choosing leaders via a web driven application. The advantage of

online voting over the common “queue method” is that the voters have the choice of voting at their

own free time and there is reduced congestion. It also minimizes on errors of vote counting. The

individual votes are submitted in a database which can be queried to find out who of the aspirants for

a given post has the highest number of votes.

This system is geared towards increasing the voting percentage in Nepal since it has been noted that

with the old voting method {the Queue System}, the voter turnout has been a wanting case. With

system in place also, if high security is applied, cases of false votes shall be reduced.

With the “ONLINE VOTING SYSTEM”, a voter can use his\her voting right online without any

difficulty. He\She has to register as a voter first before being authorized to vote. The registration

should be done prior to the voting date to enable data update in the database.

However, not just anybody can vote. For one to participate in the elections, he/she must have the

requirements. For instance, he/she must be a registered citizen i.e. must be 18 and above years old. As

already stated, the project ‘Online Voting' provides means for fast and convenient voting and access

to this system is limited only to registered voters.

1
Internet voting systems are appealing for several reasons which include; People are getting more used

to work with computers to do all sorts of things, namely sensitive operations such as shopping and

home banking and they allow people to vote far from where they usually live, helping to reduce

absenteeism rate.

1.2 Problem statement

The current situation of the existing manual system of voting include among others the following:

1. Expensive and Time consuming: The process of collecting data and entering this data into

the database takes too much time and is expensive to conduct, for example, time and money is

spent in printing data capture forms, in preparing registration stations together with human

resources, and there after advertising the days set for registration process including sensitizing

voters on the need for registration, as well as time spent on entering this data to the database.

2. Too much paper work: The process involves too much paper work and paper storage which

is difficult as papers become bulky with the population size.

3. Errors during data entry: Errors are part of all human beings; it is very unlikely for humans

to be 100 percent efficient in data entry.

4. Loss of registration forms: Some times, registration forms get lost after being filled in with

voters’ details, in most cases these are difficult to follow-up and therefore many remain

unregistered even though they are voting age nationals and interested in exercising their right

to vote.

5. Short time provided to view the voter register: This is a very big problem since not all

people have free time during the given short period of time to check and update the voter

register.

6. Above all, a number of voters end up being locked out from voting.

2
Security Issues of Online Voting

Foreign experience revealed that they are often confronted by security issues while the online voting

system is running. The origin of the security issues was due to not only outsider (such as voters and

attackers) but also insider (such as system developers and administrators), even just because the

inheritance of some objects in the source code are unsuitable. These errors caused the voting system

to crash.

The proposed solutions were correspondingly outlined to hold back these attacks. For example, to

avoid hacker making incursion into the voting system via network, we can design our system to

transmit data without network. Another example is to limit voter to input particular data, so that we

can prevent the command injection from running

1.3 Objectives of the Project

The specific objectives of the project include:

 Reviewing the existing/current voting process or approach in Organization ;

 Coming up with an automated voting system in Organization;

 Implementing a an automated/online voting system;

 Validating the system to ensure that only legible voters are allowed to vote.

 The aim of framework is to provide a common structure so that developers don’t have to redo

it from scratch and can reuse the code provided. In this way, frameworks allows us to cut out

much of the work and save a lot of time

1.4 Scope of the Project

It is focused on studying the existing system of voting in and to make sure that the peoples vote is

counts, for fairness in the elective positions. This is also will produce:

3
 Less effort and less labor intensive, as the primary cost and focus primary on creating,

managing, and running a secure web voting portal.

 Increasing number of voters as individuals will find it easier and more convenient to vote,

especially those who are abroad having name on voter list

Features

 Require less number of staff during the election.

 This system is a lot easier to independently moderate the elections and subsequently

reinforce its transparency and fairness.

 Less capital, less effort, and less labor intensive, as the primary cost and effort will focus

primarily on creating, managing, and running a secure online portal.

 Increased number of voters as individual will find it easier and more convenient to vote,

especially those abroad.

1.5 Methodology/Procedure

 For the development of project the designing of database was done on PHPMYADMIN, back

end was coded in basic PHP and for frontend we used the same basic PHP codes.

 Software methodologies are concerned with the process of creating software – not so much

the technical side but the organizational aspects. Several software development approaches

have been used since the origin of information technology.

1.6 Project Framework

A framework is a standardized set of concepts, practices, and criteria for dealing with a common type

of problem, which can be used as a reference to help us approach and resolve new problems of a

similar nature.

4
Data and Information

Data collection plays an important role in a projects succession and also it plays an inevitable role in

the timely completion of the project. The data in the project includes contact information of the clients

and their respective feedbacks/complaints which is stored in a database. To assure safety, only the

admin has proper access to the information provided by the clients.

Primary Source of Data

Primary data are the first hand data. The necessary information was collected from day to day

observation, problems, instructions of supervisor. Queries and personal discussion with the staff of the

organization.

 Observation of working environment

 Informal discussion and interaction with the staff of the library department

Secondary Source of Data

The Secondary sources of data were collected in order to achieve the real and fact data as far as

available. The major sources of secondary data are as follows:

 Annual reports of the concerned organization

 Related websites

5
CHAPTER TWO

LITERATURE REVIEW

2.1 INTRODUCTION

Previously, voting for general and local elections are done by electors with voting papers and

voting boxes in which the voting papers are placed. This method reveals some kinds of

negative situations. Not being able to determine which party or person the stamp belongs to,

the probability of placing the voting papers in the wrong box, problems with counting the

votes, loss of time when there happen to be some objections, paper printing and expenditures

done for personnel are some of the disadvantages of the classical election system. The secret

ballot is a fundamental instrument for protecting the freedom of choice for voters. For this

reason, it is necessary to use new technologies for making the election system more trustable,

economic and faster.

The electronic election system is set into use in some countries, especially in USA and

Europe, at the beginning of the nineties as a result of innovating technology and it became

more trustable by improving itself at the present day. Electronic voting is an activity of

realizing voting in an electronic environment. The electronic election is a system which

enables fast counting by electronic voting (Bilgin et al., 2011).

Electronic voting is used in some countries in the world and there are also studies about it

(Babu and Padmavathamma, 2006). Electronic voting is used for parliamentary elections in

Australia in 2001 (Schoen and Faas, 2005), for student union elections in Austria in 2003

(Prosser et al., 2003), for municipal elections in Canada in 2003 (Nakhaie, 2006), for both

general and local elections in India in 2003 (Gorla, 2009). As a result of developments on

information technologies in recent years, public opinion polls and nation-wide general

elections will be realized faster and more effectively on the electronic environment.

6
Online voting entails the use of computers or smart electronic devices for voting processes

which eliminates the use of paper voting systems. Some e-voting systems are designed to

produce paper trail of the voting process as a means of double checking and confirming

manually the results of the electronic system. E-voting systems can be on or off the internet,

internet based system creates opportunities for remote voting centre which increases

accessibility and reduces queues at voting centres but it may be susceptible to identity fraud,

hacking attacks and election result manipulation (Habibu et al., 2017).

2.2 LITERATURE REVIEW SUMMARY

S/NO AUTHORS ARTICLE JOURNAL VOLUME

1. King-Hang A Review of Volume 1, Number


Contemporary E- 1, February 2017
voting:
Requirements,
Technology,
Systems and
Usability

2. Pavi Saraswat A Comparitive Management


Analysis on E- Research and
Voting System Practice
Using Block chain
(Vol. 2, Issue 3)

3. Emad Abu-Shanab E-voting systems: a Management


tool for e-democracy Research and
Practice(Vol. 2, Issue
3)

4. Ömer Özgür Tanrıöver A Systematic Received: 18 July


 
Review of 2020 / Revised: 6
Challenges and Published: 9 August
Opportunities of 2020August
Blockchain for E- 2020 / Accepted: 7
Voting August 2020 

7
5. EmranAljarrah E-voting in Jordan: Volume 63, October
Assessing readiness 2016, Pages 860-867
and developing a
system

6. A Review of the Underlying Okediran Oladotun Vol 2, No.1, 2012


Concepts of Electronic Voting Olusol

7. Yet another improvement over the F.Rodríguez- Volume 29, Issue


Mu–Varadharajan e-voting Henríquez 4, May 2017
protocol

8. Garcia-Zamora, An e-Voting System 2015


for Medium Scale
Online Elections I

9. VíctorMateu Constructing Volume 42, June


credential-based E- 2014, Pages 39-44
voting systems from
offline E-coin
protocols

10. Dimitris Agritzalis Principles and Volume 21, Issue


requirements for a 6, 1 October 2002,
secure e-voting Pages 539-556
system

2.3 RELATED WORKS

Election is the process that gives the citizens the rights to select candidates to represent them

in a democratic pattern. Election deals with the democracy and freewill of citizens, for this

reason voting process is considered to be very critical and sensitive process, therefore

election implementation must serve many requirements in order to deliver a trustworthy

8
election. These requirements can be defined as user conventions requirements and delivery of

secure voting process requirements. Due to the fast development of network technology the

world is going toward the use and implementation of the e-technology in every aspect of our

life including e-governments. Online voting becomes one of these technologies. Online

voting refers to the use of hardware and software to establish an electronic system, useful in

voting process, by generating an electronic ballot that replaces the paper ballot. E-voting was

introduced by e-governments especially in Europe in order to serve voting convention by

providing remote system so the voter can cast his/her vote whenever and wherever he/she

can. These systems will increase voter’s participation and will speed up the votes counting.

Introducing remote voting technique over the internet (e-voting) will serve voter’s

convention. The main idea of this technology is to speed up the ballot counting and increase

voters’ participation by providing remote voting process and social interaction platforms.

2.4 RESEARCH GAP


Previous researchers and developers have phased some shortages, challenges and limitation

which assist in creating a system that vast the vision of the current problems to overcome

these problems.

As the above points have been presented and dissected, a variety of technologies in a

different application have been used to make and design electronic voting systems. These

electronic systems can be used in, organizations, universities as well as democratic countries

many researchers have been done to improve these systems and reduce the errors may occur

during the election process.

2.5 SUMMARY OF LITERATURE REVIEWED

The electronic election system is set into use in some countries, especially in USA and

Europe, at the beginning of the nineties as a result of innovating technology and it became

9
more trustable by improving itself at the present day. Electronic voting is an activity of

realizing voting in an electronic environment. The electronic election is a system which

enables fast counting by electronic voting. Electronic voting is used in some countries in the

world and there are also studies about it.

Electronic voting is used for parliamentary elections in Australia in 2001, for student union

elections in Austria in 2003, for municipal elections in Canada in 2003, for both general and

local elections in India in 2003. As a result of developments on information technologies in

recent years, public opinion polls and nation-wide general elections will be realized faster and

more effectively on the electronic environment. Online voting entails the use of computers or

smart electronic devices for voting processes which eliminates the use of paper voting

systems. Some e-voting systems are designed to produce paper trail of the voting process as a

means of double checking and confirming manually the results of the electronic system.

CHAPTER THREE

METHODOLOGY

3.0 Introduction
The methodology chapter can begin with an opening statement as seen below:

This chapter gives an insight into the design, method, process and technique used in
generating and analyzing the data of the study. All the stages are captured under the
following sub-headings:

10
3.1 Software Process Model

3.2 Steps in Process Model

3.3 Advantages, Disadvantages

3.4 Front end technologies

3.5 Back End technologies

3.6 Server Support

3.7 Software Tools

3.8 Project Work Plan (Computer science), SRS Document/ SDD Document (SENG)

3.1 Software Process Model


In software engineering, a software process model is the mechanism of dividing software

development work into distinct phases to improve design, product management, and project

management. It is also known as a software development life cycle.

11
Figure 3.1 Software Development Life Cycle (https://inoxoft.com/blog/7-
software-development-models-comparison-how-to-choose-the-right-one/)

3.2 Steps in Software Process Model


A software process model is an abstraction of the software development process. The models
specify the stages and order of a process. The stages of SDLC from some particular
perspectives are (http://www.ijser.org/):

1. Specification.

2. Design.

3. Validation.

4. Evolution.

3.2.1 CHOSEN MODEL

The Waterfall model represents a breakdown of software project activities in a linear


sequential phase. Each phase of this model relies on the deliverables of the previous phase,
and it corresponds to the particular aspects of the tasks. The Waterfall model is the first
software process model that was introduced. This model is extremely easy to understand by
the developers.

The stages of waterfall model are as:

12
1. Requirement Analysis
2. System Design
3. Implementation/Coding & Unit Testing
4. Testing, Integration And verification
5. Development
6. Maintenance

3.2.2 WATERFALL MODEL


Each phase of this model is completed before the next phase to avoid the overlapping
among the multiple phases. The Waterfall model illustrates the software process in a linear
sequential flow, which means that any face of the whole process begins only if the previous
phase is completed. The approach of this model is typical for most of the areas of software
engineering design.

It goes from requirements > design > development > testing > deployment >
maintenance. (https://inoxoft.com/blog/7-software-development-models-comparison-how-to-
choose-the-right-one/, 2008).

Figure 3.1: Waterfall Model (https://inoxoft.com/blog/)

13
The main advantage of Waterfall is that the model is in strict order with regards to the tasks

carried out and their timelines. Due to being fixed, the tasks can be easily divided between

software departments and monitored as to task completion. Clients may find the Waterfall

Model a reliable approach as they will be aware of the whole process from the start till finish

beforehand. As for the disadvantages of the Waterfall Model, there are some as well. For

instance, Waterfall has no revision of a task. The farther the application development goes

forward into the other stage the harder it is to go back and change its conceptual basics or

documentation.

3.3 Advantages, Disadvantages


In this part, it specifies with various software engineering models and their advantages and
disadvantages

Advantages and Disadvantages of Waterfall


Advantages

• Minimizes planning overhead since it can be done up front.

• Structure minimizes wasted effort, so it works well for technically weak or inexperienced
staff.

Disadvantages

• Inflexible

• Only the final phase produces a non-documentation deliverable.

• Backing up to address mistakes is difficult

Advantages and Disadvantages of V-Model


Advantages

• Simple and easy to use.

• Each phase has specific deliverables.

• Higher chance of success over the waterfall model due to the early development of test
plans during the life cycle.

14
• Works well for small projects where requirements are easily understood.

Disadvantages

Very rigid like the waterfall model.

• Little flexibility and adjusting scope is difficult and expensive.

• Software is developed during the implementation phase, so no early prototypes of the


software are produced.

• This Model does not provide a clear path for problems found during testing phases

Advantages and Disadvantages of Spiral Model


Advantages

• High amount of risk analysis.

• Good for large and mission-critical projects.

• Software is produced early in the software life cycle.

Disadvantages

• Can be a costly model to use.

• Risk analysis requires highly specific expertise.

• Project’s success is highly dependent on the risk analysis phase.

• Doesn’t work well for smaller projects

Advantages and Disadvantages of RAD


Advantages:

The RAD Model allows for reduced development time and allows for more customer
feedback throughout the software development.

Disadvantages:

The applicability of the RAD Model is limited, as the project needs to be easily modularized
into several increments. It also requires highly-versed developers as well as excellent
modeling and planning skills. Issues with the final assembly of components could result in
unforeseen setbacks and the redeveloping of components to properly fit the rest.

15
3.4 Front end technologies
In this part, Description on Frontend technologies, software development tools and
programming languages that are used to create the user interface and experience of a website
or application.

Hypertext Markup Language (HTML 5) will be used for structural layout, Cascading Style

Sheets (CSS 3) for style, JavaScript scripting language for client side scripting, and bootstrap

5 for responsiveness.

3.5 Back End technologies


Backend technologies are a combination of servers, applications, and databases.

Hypertext Preprocessor (PHP) will be used for server side scripting and MySQL for

Database. A combination of these languages was chosen because it is a powerful combination

that provides all needed and necessary routines for web development.

3.6 Server Support


Web server software such as Apache; and many other technologies depending upon the
application being built. XAMPP 5.8 will be used as server support for this project

3.7 Software Development Tools


Development tools can be of many forms like linkers, compilers, code editors, GUI designer,
assemblers, debugger, performance analysis tools etc.

The integrated development environment (IDE) for the implementation is visual code studio,

it was chosen as the IDE because it is powerful, flexible, robust, simple user interface and

uses pure Win32 API and STL which ensures a higher execution speed and smaller program

size. It also has other features such as Syntax Highlighting, Syntax Folding, User Defined

Syntax Highlighting and Folding, PCRE (Perl Compatible Regular Expression)

Search/Replace, GUI entirely customizable, Auto-completion and Multi-Document (Tab

interface) among others.

Table 3.1 Implementation Summary

16
CATEGORY DESCFRIPTION

Operating system Microsoft window & professional edition

Integrated Development Visual code studio, Window apache MYSQL


Environment (IDE) PHP (XAMP)
Programming language PHP, JAVA SCRIPT, CSS, HTML

Database MYSQL 3.3

Technology PHP and Bootstrap

Web Browser Mozilla Firefox, Google Chrome, internet


explorer

3.8 Project Work Plan (Computer science), SRS Document/ SDD Document (SENG)

A work plan is a written document designed to streamline a project. The purpose is to create a
visual reference for the goal, objectives, tasks and team members who are responsible for
each area.

Table 3.2 Project Work Plan

OBJECTIVES TIME FRAME

Requirement gathering 2 weeks

Requirement Analysis 1 week

Implementation 1 month

Development 1 month

Testing 3 weeks

17
CHAPTER FOUR

SOFTWARE DESIGN, ARCHITECTURE & TESTING METHODS

4.0 Introduction
Software design is the process by which an agent creates a specification of a software artifact
intended to accomplish goals, using a set of primitive components and subject to constraints.
Software architecture is, simply, the organization of a system. This organization includes all
components, how they interact with each other, the environment in which they operate, and
the principles used to design the software.

Software testing methodologies are the various strategies or approaches used to test an
application to ensure it behaves and looks as expected.

4.1 UML Design Diagram


UML diagram is a diagram based on the UML (Unified Modeling Language) with the
purpose of visually representing a system along with its main actors, roles, actions, artifacts
or classes, in order to better understand, alter, maintain, or document information about the
system.

Use Case Diagram

Most known diagram type of the behavioral UML diagrams, Use case diagrams gives a
graphic overview of the actors involved in a system, different functions needed by those
actors and how these different functions are interacted. It’s a great starting point for any
project discussion because you can easily identify the main actors involved and the main
processes of the system.

18
Figure 1: Use case Diagram

Above figure represents Use Case Diagram of the project and is a useful technique for
identifying, clarifying, and organizing system requirements. It describes how a user uses a
system to accomplish a particular goal. Use cases help ensure that the correct system is
developed by capturing the requirements from the user's point of view.

Sequence Diagram

19
A sequence diagram is a type of interaction diagram because it describes how—and in what
order—a group of objects works together. A sequence diagram specifically focuses on
lifelines, or the processes and objects that live simultaneously, and the messages exchanged
between them to perform a function before the lifeline ends.

Figure 2: Sequence Diagram

Above diagram represents Sequence Diagram of the project which is a type of interaction
diagram because it describes how—and in what order—a group of objects works together. A
sequence diagram specifically focuses on lifelines, or the processes and objects that live
simultaneously, and the messages exchanged between them to perform a function before the
lifeline ends.

20
4.2 Database Design
Database design is the organization of data according to a database model. The designer
determines what data must be stored and how the data elements interrelate. With this
information, they can begin to fit the data to the database model.

Admin
This table holds the records consisting of the names of the system administrators, their
username and passwords. An admin can be able to add more administrators in the admin
panel.
Table 3. 1 Database design for Admin

COLUMN NAME DATA TYPE SIZE


User Id Int 11
Username Varchar 50
Password Varchar 60
Full name Varchar 50
Photo Varchar 150
Date added Date

Register Voters

This table holds the records of the voters that are registered into the system. The table records

the Voter ID, the first and last name of the voter, password etc.

Table 3. 2 Database design for registering voter

FIELD NAME DATA TYPE SIZE

User Id Varchar 11

VoterID Varchar 20

FirstName Varchar 30

LastName Varchar 30

Middlename varchar 10

Password Varchar 60

21
Gender Varchar 50

Department Varchar 50

Registering Candidates

This table holds the records of the registered candidates, candidate id, candidates name,

candidates’ position etc.

Table 3. 3 Database design for registered candidate

FIELD NAME DATA TYPE

User Id Int(11)

Position_Id Int(11)

FirstName Varchar(20)

Middle name Varchar(20)

LastName Varchar(20)

Gender Varchar(10)

Position Varchar(20)

Photo Varchar(100)

Casting Votes

This table holds records containing the vote’s id, voter id, and candidate id and position id

names.

Table 3. 4 Database design for votes

22
FIELD NAME DATA TYPE SIZE

Id Varchar 11

Voter_Id Varchar 11

Candidate_Id Varchar 11

Position_Id Varchar 11

Positions

This table holds records containing the names of the different positions that candidates are

contesting for.

Table 3. 5 Database design for positions

FIELD NAME DATA TYPE SIZE

Id Int 11

Description Varchar 50

Max_vote Int 11

Priority Int 11

Election Registration

This table holds records containing the names of the different positions that candidates are

contesting for.

Table 3. 5 Database design for election

FIELD NAME DATA TYPE SIZE

Election Id Int 11

Description Varchar 50
23
Status Int 11

Date Creteda date

4.2 Screen Design


Screen of Front-end development is the technical implementation of the software's user
interface (UI). UI design is the graphical bridge that connects the two.

VOTER LOGIN

ADMIN LOGIN

24
ADMIN DASHBOARD

CANDIDATES

25
VOTERS LIST

VOTING RESULT

26
4.2 Testing Methods

Software testing methodologies are the various strategies or approaches used to test an

application to ensure it behaves and looks as expected. However, when it comes to the

different types of QA testing, the only two types that come to anyone's mind are manual and

automated testing.

4.2.1 Unit Testing

Unit testing refers to the testing certain functions and areas of the code. It gives the ability to

verify that all the functions work as expected. Eventually, it helps to identify failures in the

algorithms as well as logic to help improve the quality of the code that composes a certain

function.

4.2.2 Integration Testing

27
Integration testing is basically a logical extension of unit testing. In simple words, two tested

units are combined into a component and the interface between them is tested. It identifies

problems that occur when different units are combined the different modules of this project

have undergone integration testing while being merged.

4.2.3 System Testing

System testing tests the behavior of whole system as defined by the scope of the development

project. It might include tests based on risks as well as requirement specifications, business

process, use cases or other high level descriptions of system behavior, interactions with the

operating systems and system resources. It is most often the final test performed to verify that

the system meets the specification and its objectives. System testing has been performed at

the completion of each feature and is still taking place to make improvements on the existing

system.

Test Scenario ID Test Scenario Description Test Case ID Test Case Description

Enter a valid email &


TCS_PRS_001 Verify the login functionality TC_PRS_Login_001 valid password

Enter a valid email &


TCS_PRS_002 Verify the login functionality TC_PRS_Login_002 invalid password

Enter an invalid email


TCS_PRS_003 Verify the login functionality TC_PRS_Login_003 & valid password

Enter an invalid email


TCS_PRS_004 Verify the login functionality TC_PRS_Login_004 & invalid password

28
Enter none of the
TCS_PRS_005 Verify the login functionality TC_PRS_Login_005 credentials

TCS_PRS_006 Verify the login functionality TC_PRS_Login_006 Enter only password

TCS_PRS_007 Verify the login functionality TC_PRS_Login_007 Enter only email

Test steps Pre-Conditions Test data Post Conditions

1. Enter valid email


2. Enter valid password Valid URL Email:[email protected] Redirect to
3. Click login button Test Data Password: Admin123 dashboard page

1. Enter valid email Error: Invalid


2. Enter invalid password Valid URL Email: [email protected] Email or
3. Click login button Test Data Password:******** Password

1. Enter invalid email Error: Invalid


2. Enter valid password Valid URL Email:********* Email or
3. Click login button Test Data Password: Admin123 Password

1. Enter invalid email Error: Invalid


2. Enter invalid password Valid URL Email:********* Email or
3. Click login button Test Data Password:******* Password
  Valid URL Email: Redirect to
1. Click login button Test Data Password: dashboard page
1.Enter password Valid URL Email: Please fill out
2.Click Login Test Data Password: Admin123 this field
1.Enter email Valid URL Email: [email protected] Please fill out
2.Click Login Test Data Password: this field

Expected Results Actual Results Status

Login Successful Login Successful Pass


Error: Invalid Email or Password Login Successful Fail

Error: Invalid Email or Password Error: Invalid Email or Password Pass

Error: Invalid Email or Password Error: Invalid Email or Password Pass

29
Message: Please fill out this field Login Successful Fail
Message: Please fill out this field Error: Please fill out this field Pass

Message: Please fill out this field Error: Please fill out this field Pass
A test case is a specification of the inputs, execution conditions, testing procedure, and

expected results that define a single test to be executed to achieve a particular software

testing objective, such as to exercise a particular program path or to verify compliance with a

specific requirement.

CHAPTER FIVE

CONCLUSION AND DISCUSSION

5.1 Conclusion

This Online Voting system will manage the Voter’s information by which voter can login and

use his voting rights. The system will incorporate all features of voting system. It provides

the tools for maintaining voter’s vote to every party and it count total no. of votes of every
30
party. There is a database which is maintained by the admin in which all the names of voter

with complete information is stored.

In this member who had registered his/her information on the database and when he/she want

to vote he/she has to login by his email/voterId and password and can vote to any candidate

only single time. Voting detail store in database and the result is displayed by calculation. By

online voting system percentage of voting is increases. It decreases the cost and time of

voting process. It is very easy to use and it is vary less time consuming. It is very easy to

debug.

5.2 Future Enhancement

With the existing constraints, the developed systems is not what was planned initially. The

primary aim of this project has been met. All the objectives that were set out have been

completed and giving positive results in the ends. In the future some features that can be

added will be about the two factor authentication. Although the user requirements were

successfully met the application is not yet fully utilized because the users of this system are

just learning about the benefits and working of the system. The user testing and evaluation of

the application did however highlight rooms for the expansion. The application could

therefore be developed further as soon as the user is fully aware of its working.

REFERENCE

[1] Aggarwal, K. K., & Yogesh, S. (2008). Software Engeering (Third Edition).
Daryaganj,

NewDelhi: New International Publishers.

[2] Aderibigbe I. A, Victor O. M, Temitope M. John, Stanley Uzairue (2018).


Implementation of

31
E-voting System for Student Union Government Elections.TELKOMNIKA,
Vol.16,October 2018, pp.2155~2164.

[3] Babu GA, Padmavathamma M (2006). Optimally efficient multi authority secret
Ballot e- e

lection scheme, J. Theor. Appl. Inf. Technol., 2(1): 1- 6.

Bilgin, Adem Alpaslan Altun and Metin. (2011). Web based secure e-voting system
with

fingerprint. Scientific Research and Essays Vol. 6(12), pp. 2494-2500 .

[4] Emereonye Goodluck I (2013). Students’ Union Government, a Tool for


Demonstrating True

Democratic Values.

[5] https://www.w3schools.com/php/default.asp

[6] http://www.tizag.com/cssT/ (for css coding reference)

[7] http://www.tizag.com/mysqlTutorial/ (for the use of tables)

[8] https://www.w3schools.com/php/default.asp

[9] http://www.tizag.com/cssT/ (for css coding reference)

[10] http://www.tizag.com/mysqlTutorial/ (for the use of tables)

32

You might also like