Вы находитесь на странице: 1из 10

International Journal of Compu ter & Communication Engineering Research (IJCCER)

Volume 2 - Issue 6 November 2014

ELECTRONIC VOTING SYSTEM FOR STUDENT


ELECTION PROCESS
Nurudeen A. Iromini1 , Hassan J. Onawola2 , Abdulazeez O. Ajao 3
1,2,3
Computer Engineering Department, Federal Polytechnic, Offa, Kwara State.
1
ajibolaforyu2003@yahoo.com , 2 honawola@yahoo.com, 3 ajaodoc@yahoo.com

Abstract - Over the years, there have been a lot of election (i) long queue of voters which discourage many people to cast
frauds, rigging, violence and steady decline in turning out of their votes during election (ii) delay in setting up the polling
Nigerian students in participating in departmental, S UG and unit (iii) violence at the polling unit (iv) insincerity in
any form of election on our campuses due to the fear of being
counting of votes (v) lack of privacy in the cubicle. All these
harmed by cultists. This is the part of major drivers for the push
of an electronic voting system which is believe d would increase problems have resulted into the discouragement of the
mobility and accuracy of voting process. In this paper we Nigerian students in partaking in election.
present an electronic voting application used for the conduct of This research is focusing at designing of an electronic
free and fear departmental, faculty, and Class representative’s system for the monitoring of election process in our tertiary
election. The application is divided into Control application institution in order to provide good atmosphere to cast vote
where administrator register candidates, prints result of the and to guide against any form of elect ion frauds that emanates
elections and the Client application provided for the students to during election like stealing of ballot bo x, violence etc that
cast their votes for the candidate of their choice. The password prevents most of the students in partaking in election. Th is
generated during registration process and matriculati on number
application will pave way for students to vote for the leader
is used by the students to login to voting page. The application
gives no room for multiple voting by a single voter, rigging, of their choice without intimidation. This type of electronic
stealing of ballot box, violence since the students can be means of voting will (i) guide against any form of elect ion
anywhere and cast his/her vote after they have been properly malpractice (ii) allow the right person to take the lead of
connected to the database. The result of our application revealed Institution politics (iii) disallow mult iple votes by a single
that the application gives accurate result for the conduct of class person (iv) allow only eligible people to vote (v) disallow the
representative election of HND I Computer Engineering possibility of vote casted to be changed by anyone else. This
students.36 students voted for matriculation number application can be used to monitor election process in our
CT/HND/F12/0946 while 35 students voted for matriculation tertiary institutions. The widespread deployment of the
number CT/HND/F12/0971. The implementation of electronic
internet and use of computers is an extra reason where there
voting system in Institutions elections will drastically reduce
violence on campuses and guide against multiple voting by has been a lot of call for the inclusion of an electronic voting
students. system where voters can participate remotely v ia the internet.
Keywords: Ballot Paper; Electronic Voting S ystem; Electoral
Officer; Distributed Computing. II. RELA TED WORKS
Elections are understood to be the key mainstay of
I. INTRODUCTION democracy all over the globe and voting is one of the
Elections are the process by which populace choose their electoral routes that ensure the sustenance of democrat ic
representatives and experience their preferences for how they system in any civilization. Voting is the process that allo ws
will be governed. Through election, it is possible for the the general public or the people to choose their leaders and
people to cast their votes for the candidate of their choice. articulate views on how they will be governed. The veracity
The election system in any part of the country must be of democrat ic s ystem is primary to the veracity of election
sufficiently robust to guide against any fraudulent behaviors itself consequently the election system must be satisfactorily
and must be sufficiently transparent and understandable that secured to survive a range of fraudulent behaviors and
voters and candidates can accept the results of an election. must be sufficiently translucent and comprehensible that
Electronic voting (known as e-voting) is a term voters and candidates can accept the outcome of an election.
encompassing both electronic means of casting a vote and Unsurprisingly, history is littered with examp les of elections
electronic means of counting votes. Electronic voting system being maneuvered in order to change their outcome [1]. An
is a system whereby an individual has the right to vote for the overview of the experience of the opening of two years of an
leader of their choice via online website without intimidation. institution-wide project in introducing electronic voting
The E-voting system is a desktop-based application (but equipment for lectures was presented by [2].
distributed over network) capable of recognizing the eligible Vot ing system is defined [3] as a vital tool to collect and
voters and grant them access to vote. reflect people’s opinion to elect a candidate of their choice to
Elections were being done in Institutions by the use of occupy a position or people to govern them. Voting process
ballot papers by the eligible voters (students) to cast their in developing countries, Nigeria inclusive has been faced
votes to the candidates of their choice. This method of voting with a lot of challenges associated with traditional voting
is vulnerable and gives room for v iolence, waste of students’ systems prone to tampering and security infringements.
life and rigg ing of elections. It is generally known that Technology security expert consider ten required features that
people are not ready to die young as party in authority is characterized a successful voting system. These are accuracy,
using the power of incumbency to put their candidates onto convenience, reliability, scalability, flexibility, consistency,
the seat. democratic, timeliness, acceptability and privacy which can
There are so many problems in the process of conducting be achieved today with the development and widespread use
election to political offices in our society. Among which are of information technologies.

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 183


Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]
A. Categories of Voting System results of an election [7]. For a voting system to be considered
Vot ing system can be generally categorized into two transparent and comprehensible, some important criteria must
major types namely: (a) Traditional Voting System (TVS) and be met: First, the anonymity of voter’s ballot must be
(b) Elect ronic Vot ing System (EVS). preserved in order to ensure that the voter is safe when voting
The two basic voting systems without electronic means are: against a candidate and also to guarantee that voters have no
(i) p ap er ballo t meth od and (ii) mechan ical lev er machine evidence that proves which particular candidates received
method. their vote. It is believed that the existence of such evidence
The paper ballot system, wh ich is still very common in could allow votes to be bought. Secondly, the voting system
sub- Sahara Africa, Nigeria not an exemption usually, must be tamper-proof in order to prevent a wide range of
emp loys uniform ballots of various stock weights on which attacks, including ballot stuffing by voters and incorrect
the names of all candidates and issues are printed. Voter tallying by insiders (poll officials). Thirdly, it should be user-
record their choices, in private by marking or thumb print friendly. This means that it should be easily co mprehensible
the boxes next to the candidate or issue choice they select and and usable by the entire voting populace [7].
drop the voted ballot in a sealed ballot box. The paper ballot Electronic voting (e-voting) is one of the pillars of the e-
system was first adopted in the Australian state of Victoria in democracy, which refers to the use of computers or
1856 and in the remaining Australian states over the next computerized voting equipments to cast and tabulate ballots
several years, where it became known as the “Australian in an elect ion in a trustable manner [8].
ballot.” New York became the first American state to adopt Several works have been done in the area of electronic
the paper ballot for state wide elections in 1889. As of 1996, voting system for the monitoring of election process on our
paper Ballots were still used by 1.7% of the registered voters campuses. The US has been experimenting with different
in the United States. They are used primarily as alternative forms of electronic voting system for a nu mber of years.
voting system in small co mmunit ies and rural areas. Currently, nu merous voting technologies have been
In the mechanical lever voting system, the name of each implemented across the country. In the year 2004
candidate or ballot issue choice is assigned a particular lever presidential election, around 40 million votes were cast
in a rectangular array of levers on the front of the machine. A electronically in polling sites. Voting over the internet on the
set of printed strips visible to the voters identifies the lever other hand is met with great skepticis m.
assignment for each candidate issue choice. The levers are Fingerprints identification was integrated [9] into electronic
horizontal in their unvoted position. And when a voter enters voting machine using microcontroller. The use of fingerprint
the booth and closes the curtain by means of a lever, the to identify voters not only guarantees the voters’ anonymity
machine unlocks for voting. The titles of all elective offices but also ensures a one-man one-vote system.
are listed on the face of the machine along with the party In recent years, electronic voting systems have been
candidates running for each office. Above each name is a deployed in all US elections. Despite the fact that
lever which, when depressed, indicates a vote for that cryptographic integrity checks are used in most systems,
candidate. several reports have documented serious security
When the voter pulls the curtain open to leave, the vulnerabilities of electronic voting terminals [10]. An
mach ine automatically registers the vote and is cleared for overview of the typical security and election vulnerabilit ies
use by the next person. Only one candidate for each office found, in most, if not all, electronic elect ion systems were
is allowed to be selected during this process. If all also presented.
mechanical connect ions are fully operational during the Also, in the paper presented by Richards S. and Drake
voting period and the counters are initially set to zero. The P.M., he analy zed the security considerations for a remote
position of each counter at the close of the polls indicates the internet voting systems based on the s ystem architecture of
number of votes cast on the lever that drives it. Interlocks in remote internet voting. The feasibility of successful carrying
the machine prevent the voter from voting for more choices out of remote electronic voting over the existing internet
than permitted [4]. infrastructure that conforms to the requirements of a public
In electronic voting system, voter records their secure and election process was also examined using Delov-Yao Threat
secret ballot electronically using modern technological Analysis Model. Multifactor authentication and cryptographic
dev ice such as computer and mobile devices where the hash function methods was used to improve the
system can compile and tabulate results automatically. authentication and integrity of e-voting system [11].
Electronic Vot ing System (EVS) can be described as a In Belg iu m, a new p rototype i.e. an improved paper-based
voting system by which election data are recorded, stored, voting system, developed by a consortium led by Smart matic
and processed electronically, primarily as digital informat ion was employed [12]. According to paper presented in Taita
[5]. Electronic voting (also known as e-voting) Taveta University College by [13], he described the process
encompasses both electronic means of casting a vote and undertaken to achieve development and deployment of a web
counting the votes. based system to promote free and fair democratic
Theoretical study about existing electronic voting electioneering process. The system was developed using the
techniques was given [6] as well as requirements and security incremental prototyping due to the adaptive nature of web
issues of modern electronic voting systems. He also presented based applications and the system proved that a computerized
modern voting solutions including s ecurity functionalities solution is possible with elimination of human related faults
provided by the system, the cryptographic techniques used that are a commonplace in emp loy ment of human clerks to
and some threats and attacks to the systems. manage the election process.

B. C ha ra ct eri st ics o f a vo tin g syst em C. Traditional Manual Voting System (Federal Polytechnic,
Voting systems must be transparent and comprehensible Offa)
enough that voters and candidates can readily accept the
© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 184
Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]
It is necessary for us to place the spotlight on elections that official for verification and voting on the ballot paper
conducted by the Independent College Electoral Co mmittee given to him.
and supervised by the Directorate of Students’ affairs of the IV.) Counting of vote: Ballot counting is done manually.
polytechnic which is believed to be a good example of The votes for the respective candidates are collated and
manual voting system. counted after all the invalid votes(voids) have been
removed. After this, the Chairman of the electoral
D. Procedure for Student Government Office Election commission publishes the final result.
Student government elections and candidate campaigns are Nu mber of problems is associated with this manual voting
governed by procedures developed by the Student Union system like (i) Invalid votes (ii) Long voting process (iii)
Executives. Elect ions are held in one academic year. The Rigging (iv ) loss of life (v) violence etc. A paper presented
student union election shall be held on the basis of universal by [12] unfolded the machination and manipulations of
suffrage whereby the ten officers of the student union political parties by the elites in such a way that political
executives shall be contested for. The election procedures parties are elitist in operation and the process both at power
involve several processes: acquisition which no doubt has negatively impacted on the
I.) Verification of Candidate Qualification: electoral process system to be free and fair. He also
Any contestant into Student union offices shall recommended for the government to place priority on
maintain an academic standard of not less than a-CGPA education through free and compulsory education up to senior
of 2.50. Both ND and HND students with lower o r secondary school in order to enhance the quality of political
upper credit can contest for any post provided they are participation and commun ication.
regular students. Anybody who has contested for any III. DESIGN OF THE PROPOSED SYSTEM
post before can also stand for re-election or contest for The application is a window-based application designed
any post provided that such contestant has not been for the free and fair conduct of departmental, faculty and any
previously found guilty of mismanagement or any act kind of elect ion in Nigeria. The design is network distributed
that could tarnish the image of or good name of the i.e. it prov ided client and server connectivity.
union. The system designed is divided into two:
II.) Voters Registration: This is the process of enabling an A. Control application: This allo ws the electoral
elig ible voter to have his/her name entered into voter officer to register candidates, voters and set up
register. All interested students of the polytechnic who all necessary details of the election. It also
are members of the student union and only matriculated allo ws the electoral officers to generate the
students who have paid up their union due shall be result of election at the end of the poll.
elig ible to vote. B. Client application: This application allows
III.) Voting (manual): This is the actual process of all the voters to login concurrently and cast their
casting ballots. An eligible voter goes to the polling votes for the candidate of their choice.
station and shows his/her identity card to the polling The architectural design of the system is shown in fig. 1.

CAST VOTE LOGIN


SETUP REGISTER
ELECTION CANDIDATE
VOTER
ADMINISTRATOR 1

VOTER
ACCESS POINT 2

Electoral Officer
1 LOGIN REGISTER
VOTER
VOTERS
3
SQL SERVER
(E-VOTING)

Electoral Officer
2

Electoral Officer
3

CLIENT APPLICATION
CONTROL APPLICATION

Figure 1: Architectural design of the application

A. Control Application voters for the election. E-voting control application is


E-voting control application is used to set up election connected to Microsoft SQL server. M icrosoft SQL server is
process (i.e. type of election, election posts, a relational database management system, it is a software
department/class involved, and date), register candidates and product whose primary function is to store and retrieve data

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 185


Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]
as requested by other software applications, be it those on administrator is given the priv ilege of setting up the ballot as
the same computer or those running on another computer well as edit ing the candidates’ profile. He is also provided
across a network (including he internet). with feature of viewing informat ion of the voting and
After that, server password and username has already display result as well.
been set. This is done to allow proper connection between The flowchart for the login p rocedure of the electoral
the application and Microsoft SQL server. Here only the officers is shown in fig. 2

Start

Enter UserID

Enter
Password

Check if password No
is correct

Yes

Display Control
Application Main
Form

Set up election

Register Election

Save into database

Register Election

Save into database

Stop

Figure2: Electoral Officer Flowchart

B. Client Application 2008 R2. E-voting application is the application that allows
Voters can only log in and vote for the right candidate of the voters to log in into the system and cast their vote. It is
their choice using the login form shown in Fig. 3 after the distributed across network i.e. in a polling unit, many
application has been connected to Microsoft SQL Server systems can be installed to carry the desktop application and

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 186


Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]
they will co mmunicate with a single database i.e. Microsoft designed in such a way that voter can only vote not more
SQL Server 2008 R2. than one time.
The application is highly secured to avoid/disallow
unregistered people to login into the system. It is also

Figure 3: Client applicat ion login form

Voters can only login by using the userID and The flowchart that illustrates the voting process of the
password generated during registration process election is shown in Fig. 4

Start

Count = 0

Key in
UserID

No

Key in
Is Count < 3
Username

Yes

Count = Count + 1

Exit

Check if password No
is correct

Yes

Vote for Candidate

Sure to Vote for the No


Chosen Candidate

Yes

Save into database

Stop

Figure 4: Voters Flowchart

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 187


Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]
While Fig. 5 depicts the database schema for the e-voting system
Election
ElectionCode
setup
ElectionName
Date
Candidate Year
StartTime
register MatricNo EndTime
Department
Administrator
DeptCode has PK DeptCode
PK AdmiministratorId FullName
AKA LevelId
MatricNo Dept MatricNo
ElectionCode Class DeptName
PostCode
vote

has
print

Result Voters Level

PK VotersId PK LevelId

MatricNo MatricNo DeptCode


ElectionCo DeptCode DeptName
ElectionName Class

Figure 5: e-voting system database schema

IV. SYSTEM IM PLEM ENTATION representatives of HND I students in the department of


computer engineering, federal polytechnic, offa. The
Th is refers to the development, deployment (i.e. software application gave us accurate result after the
installation and testing) of all the system components used election.
in the design. This application is tested after the successful
complet ion of the design for the election of class A. Settings Of Server

Figure 6: Server setting

Fig. 6 shows how the server is being set in order to II) Login name and password: this stands for the
allo w electoral officers on the internet to properly connect name to be used to log in along with the
to the server. All the electoral officers must be properly password
connected to Microsoft SQL server 2008 R2 that was used III) Database name: this stands for the name of
as our database. The database name is IROMINI-PC. our database

I) Server name: this represent the name of the Fig. 7 shows the form for the administrator to log in for
server to be connected to all the necessary settings and registration of candidates for
the election.

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 188


Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]

Figure 7: Electoral Officer Login Form

IV. RESULT COLLATION M ODULE


After all the SQL server settings and necessary I) User Authentication Module: This is the module that
connection of the application to the database, the following allo ws the electoral officers to register all their
modules are identified for the election procedures: members that will have access to use of the software.
I. User authentication module The interface only allows the user with valid login
II. Set-up module details to access and use the features available in the
III. Registration module and control application

Figure 8: User Authentication Module Interface

II) Setup Module: This is the module that defines  Available posts for the election and
all the election processes like:  Date and time for the elect ion
 Name of the election The election was set up for HND I co mputer
 Depart ments and levels elig ible to engineering students to determine their class representative
participate in the election for 2012/2013 session programme as shown in fig. 9.

a
© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 189
Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]

c
Figure 9: Election Setup Output (a) Election Type (b) Election position(c) Depart ment and Level involved in the elect ion

Fig. 9 shows the type of election carried out for class III) Registration Module: This is a section that is
representatives of Computer Engineering Students. i.e. purposely designed for the registration of both the
NACOM ES representative, the position of the election candidates and the voters for the election. Only
which is “class rep”, the department and level that took the registered students were given the opportunity
place in the election. The elect ion was only carried out on to partake in the election with the password given
HND I students of computer engineering. to them during the election process.

b
Figure 10: Reg istration Module for the Candidates (a) CT/ HND/F12/ 0946 (b) CT/ HND/F12/ 0971

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 190


Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]

IV) Result Collation Module: The election collation were registered for the position of class representative
report is a report that enables the electoral which are:
officers to know the winner of the poll as
well as the election result. (a) Akintayo Omotayo of Matriculat ion Nu mber
CT/HND/F12/0946 and
V. RESULTS AND DISCUSSION (b) Nurudeen Issah Ajibola of Matricu lation
Testing is a vital section for the successs of this Nu mber CT/HND/F12/ 0971
application. System tesing ensures that all the processes Fig. 11 shows the two registered students for the position
involved in the development of the application are in of class representative.
order. Two students out of 73 students in HND I class

Figure 11: Reg istered Candidates Output

However, the remaining students in the class were


registered as voters as shown in fig. 12

Figure 12: Reg istered Voters Output

It is shown that the password generated for registered CT/HND/F12/0971 had 35 votes which shows that
students is shown against their matriculation nu mber. Akintante Omotayo was the winner of the elect ion for the
Fro m the fig. 13, it is clear that Akintante Omotayo of post of class representative. There is provision for the
matriculat ion number CT/HND/F12/0946 had 36 vo tes electoral officer to print out the results of the election.
while Nurudeen Issah Ajibola of mat ricu lation number

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 191


Nurudeen A. Iro mini, et al International Journal of Computer and Communication Engineering Research [Volume 2, Issue 6 November 2014]

Figure 13: Elect ion Result

VI. CONCLUSION A ND RECOMM ENDATIONS [6] M . Stenbro, “A survey of M odern Electronic Voting
After thorough research carried out on manual system Technologies”, Norwegian University of Science and
of voting it was discovered that it is characterized by series Technology; Communication Technology Department,
(2010).
of problems like long queue, rigging, killing, stealing of
[7] G.O. Ofori-Dwumfuo and E. Paatey, “The Design of an
ballot box, result manipulation etc which has been giving Electronic Voting System”, Research Journal of
students set back in getting themselves involved in Information Technology, Vol. 3(2), p91-98. ISSN: 2041-
election and also causes conflicts among the students. That 3114. (2011).
is the reason we embarked on automation of manual voting [8] O. Cetinkaya and M .L. Koc, “Practical Aspects of
system. The goal of this study was to address the problems DynaVote e-Voting Protocol”, Electronic Journal of e-
facing paper voting using ballot papers and to provide Government, Vol. 7(4), p327 – 338 (2009) .
another means of voting known as electronic voting (e- [9] A.E. Jonathan, “A Fingerprint Identification for Integration
voting). This research has analyzed that e-voting is of into Electronic Voting M achine using a M icrocontroller”,
The Pacific Journal of Science and Technology, Vol. 13(1),
great benefit to tertiary institutions’ election and to our
(2012).
country in general if carefully implemented. Our results [10] D. Seda, K. A ggelos, M . Laurent, R. Alexander and A.S
have indicated that all means of fraudulent acts have been Alexander, “Integrity of Electronic Voting Systems:
drastically reduced and gave room fo r transparency. Fallacious use of Cryptography”, Computer Science and
In v iew of this, it is highly recommended that this study Engineering, University of Connecticut, Storrs, CT 06269,
should be adopted in any institutional and general USA and Voting System Security, LLC, 1 Technology
elections. Federal govern ment should also ensure that Drive, Tolland, CT 06084, USA. (2012).
paper voting is replaced by electronic voting system in [11] M .O.Olayemi, T.A. Oladiran, O.O. Elijah and O. Adeoye,
order to reduce physical attacks by political thugs. “Design of Secure Electronic Voting System Using
M ultifactor Authentication and Cryptographic Hash
Moreover, the user of system should be thoroughly
Functions”, International Journal of Comp uter and
educated for the proper use of the application. Information Technology, Vol. 2(6), ISSN: 2279-0764
(2013).
ACKNOW LEDGEM ENT [12] V.G. Carlos, “The New Belgian E-Voting System”, eVoting
We acknowledge staff of Co mputer Engineering Legal Lab (DER2010-16741), Spain. (2010).
Depart ment, Federal Po lytechnic, Offa for their effort and [13] J.M . Nzoka, N.M . M uthama and N.M . M ung’ithya, “Taita
contribution in this research as well contribution of Mr Taveta University College e-voting system: a web based
Adebayo Sunday for their support towards successful approach to elections management”, International Journal
complet ion of the work. of Intelligent Information Systems, Vol. 2(5), p70-76, Doi :
10.11648/j.ijiis.20130205.11 (2013).
REFERENCES
[1] S. Abdulhamid, O. S. Adebayo, D .O . U giomoh and
M .D. A bdulM alik, “The Design and Development of
Real-Time E- Voting System in Nigeria with Emphasis on
Security and Result Veracity”, I. J. Computer Network and
Information Security, vol. 5, p9-18, DOI:
10.5815/ijcnis.2013.05.02 (2013).
[2] S.W. Draper & M .I. Brown, “Increasing Interactivity in
Lectures using an Electronic Voting System”, Journal of
Computer Assisted Learning, Vol. 20, p81-94 (2004).
[3] F.O. Aranuwa, “Improved Electoral Fraud Prevention
M echanism for Efficient and Credible Elections in
Nigeria”, African Journal of Computing and ICT, Vol. 5(6),
P70-77 (2012)
[4] Paul “Voting Technology: The Not-So-Simple Act of
Casting a Ballot”, published by the Brooking Institution,
(2008).
[5] M . Bellis, “The History of Voting M achines”, (2011).

© http://ijccer.org e-ISSN: 2321-4198 p-ISSN: 2321-418X Page 192

Вам также может понравиться