Вы находитесь на странице: 1из 37

Faculty: ICT

Department: Computer Science

Report Of Final Project:


” Voting management System in php , mysql and html”

Members By:
Mohamed Abdirazak Dirie (BCS/01204/2017/GR)
Abdullahi Ahmed Farah (BCS/01195/2017/GR)
Abdinajib Mohamed Jama (BCS/01211/2017/GR)

Supervisor By:
Abdikani Ahmed Mohamed

july 2020
CERTIFICATE FROM THE SUPERVISOR

This is to certify that the summer project entitled “Voting Management System” is an academic work
done by “Our Team” submitted in the partial fulfillment of the requirements for the degree of Bachelor
of of computer science at Faculty of ICT, University Of Bosaso Garowe campus under our
guidance and supervision. To the best of our knowledge, the information presented by him in the summer
project report has not been submitted earlier.

______________________
Signature of the Supervisor
Name : Abdikani Ahmed Mohamed
Date: 13/07/ 2020

I
STUDENT DECLARATION

This is to certify that we have completed the Summer Project entitled ” project name” under the
guidance of “Mr. supervisor name” in partial fulfillment of the requirements for the degree of
Bachelor of computer science at Faculty of ICT, University Of Bosaso Garowe campus. This
is our original work and we have not submitted it earlier elsewhere.

Name Signature Id

Mohamed Abdirazak Dirie …………………. BCS/01204/2017/GR


Abdullahi Ahmed Farah …………………. BCS/01195/2017/GR
Abdinajib Mohamed Jama …………………. BCS/01211/2017/GR

Date: 13/07/ 2020

II
ACKNOWLEDGEMENT
It is our pleasure to acknowledge you that we have received a project on Voting Management System
from my teacher.

Our first sincere appreciation and gratitude goes to Abdikani Ahmed Mohamed (Supervisor) for his
guidance, constructive comments and valuable suggestions. During making of our Project he helped us a
lot.

All the work done in coming up with this system is dedicated to our family for being with/part of me in
the whole process especially our dear dad and mum who stood by us in all situations.

Finally, I wish to say thanks to all co-helper for helping us a lot.

Thank you,
Abdikani Ahmed Mohamed

III
ABASTRACT

Over the last few years, there have been a number of election observers who have suggested
introducing electronic voting election processes. A general observation is that as more business is
done using electronic mediums, it should not be difficult to carry out voting using electronic
equipment rather than turning up at the polling place on voting day to use paper and pen. The
Online Voting System (OVS) under implementation mainly addresses the voting phase. Electronic
voting using the OVS should be cheaper than the present paper based arrangement. The
phenomenal use of the Internet as a vehicle for improving communication, access to information
and electronic commerce has led to the claim that the Internet could be used as either a replacement
to attendance voting or as an additional voting option. Throughout history, election fraud has
occurred in many electoral processes from which experience shows that the manual voting process
is a major source of such vices and violence in many Organizations.
The mechanism leading to fraud is manifested in registration places by corrupt officials who are
in a position to issue voter registration data capture forms to illegitimate individuals, stuff ballot
boxes, invalidate registration for opposition voters or even coerce voters. Therefore OVS shall
reduce the time spend making long queues at the polling stations during voting. It shall also enable
the voters to vote from any branch of the globe since this is an online application available on the
internet. Cases of vote miscounts shall also be solved since at the backend of this system resides a
well developed database using MYSQL that can provide the correct data once it’s correctly
queried. Since the voting process shall be open as early as possible, the voters shall have ample
time to decide when and whom to vote for.
The main aspect behind OVS is that it enabled us to bring out the new ideas that were sustained
within us for many for many days. This project offers the voters to cast easily through internet.
Vote counting is also made easy by the OVS since it’s just a matter of querying the database. OVS
is used by a number of countries today. Developing a good system is critical to the success of the
system to prevent system failures and to gain wide acceptance as the best method available. OVS
will be an inexpensive and less time consuming method once a system exhibited. OVS serves to
be the best In use especially in the 21st century where human beings are embracing technology
and where there is malicious struggle for power by leaders all over the world. This struggle for
power has resulted in the use of all approaches by the leaders in power to remain in their positions
at whatever costs even if it means applying vote rigging to win elections. With this system in place,
a number of such problems shall be forgotten. I therefore hope that every organization should put
the OVS technology at practice to phase out some of the problems they go through during manual
voting.

IV
Table of Contents
CERTIFICATE FROM THE SUPERVISOR ............................................................................................ I
STUDENT DECLARATION .................................................................................................................. II
ACKNOWLEDGEMENT ...................................................................................................................... III
ABASTRACT ........................................................................................................................................ IV
CHAPTER I: INTRODUCTION ............................................................................................................. 1
1.1 INTRODUCTION ....................................................................................................................... 1
1.2 BACKGROUND OF THE STUDY ............................................................................................. 2
1.3 PURPOSE OF THE STUDY ....................................................................................................... 3
1.4 OBJECTIVE OF THE STUDY ................................................................................................... 4
1.5 SCOPE ......................................................................................................................................... 4
1.6 PROBLEM STATEMENT .......................................................................................................... 5
1.7 PROJECT OUTLINE.................................................................................................................. 6
CHAPTER II: LITERATURE REVIEW............................................................................................. 8
2.1 VOTING SYSTEMS .................................................................................................................... 8
2.2 PAPER-BALLOT VOTING SYSTEMS ..................................................................................... 8
2.2.1 CHALLENGES OF PAPER-BASED VOTING SYSTEMS................................................ 9
2.3 ELECTRONIC VOTING SYSTEMS ....................................................................................... 10
2.4 REVIEW OF RELEVANT LITERATURE AND OPINION .................................................. 11
CHAPTER III: RESEARCH METHODOLOGY ............................................................................. 13
3.1 RESEARCH METHODOLOGY .............................................................................................. 13
3.2 What is System Analysis? .......................................................................................................... 13
3.3 METHODS OF DATA COLLECTION.................................................................................... 13
3.3.1 Studying of Procedures Manuals ........................................................................................ 13
3.3.2 Evaluation of forms ............................................................................................................. 14
3.3.3 Interviewing of departmental representatives.................................................................... 14
3.4 ANALYSIS OF THE EXISTING SYSTEM ............................................................................. 14
3.5 PROBLEM OF THE EXISTING SYSTEM ............................................................................. 15
3.6 SOLUTIONS OF THE EXISTING PROBLEM ................................................................... 15
CHAPTER IV: PROTOTYPE AND DESIGN ....................................................................................... 16
4.1 DESIGN GOALS FOR THE PROPOSED SYSTEM............................................................... 16
4.2 FUNCTIONAL REQUIREMENTS OF THE PROPOSED SYSTEM .................................... 16
4.3 SECURITY REQUIREMENTS ................................................................................................ 17

V
4.4 DESIGN OF THE PROPOSED SYSTEM ................................................................................ 17
4.5 DATA FLOW DIAGRAMS (DFDS) ......................................................................................... 18
4.6 VOTER REGISTERING .......................................................................................................... 19
4.7 CANDIDATE REGISTERATION ........................................................................................... 19
4.8 VOTES ....................................................................................................................................... 20
CHAPTER V: TESTING AND RESULT .............................................................................................. 21
5.1 INTRODUCTION ..................................................................................................................... 21
5.2 IMPORTANCE OF TESTING ................................................................................................. 21
5.3 TESTING DEFINITIONS ......................................................................................................... 22
5.3.1 UNIT TESTING .................................................................................................................. 22
5.3.2 INTEGRATION TESTING ................................................................................................ 22
5.3.3 SYSTEM TESTING............................................................................................................ 22
5.3.4 ACCEPTANCE TESTING ................................................................................................. 23
5.4 SYTEM TESTIN AND SCREEN SHOOTS ............................................................................. 23
CHAPTER VI: CONCLUSION AND SUGGESTION .......................................................................... 28
6.1 CONCLUSION .......................................................................................................................... 28
6.2 SUGGESTION........................................................................................................................... 29
6.3 REFERENCES .......................................................................................................................... 30

VI
CHAPTER I: INTRODUCTION

1.1 INTRODUCTION

The act of casting a ballot during an election cycle has been plagued by a number of problems,
both intrinsic and extraneous. The old-fashioned paper ballot solves a number of problems, but
creates its own.

The clear 21st Century solution is the use of an automated electronic system for collection and
tallying of votes, but the attitude of the general populace towards these systems has been
overwhelmingly negative, supported in some cases by fraud and abuse.

The purpose of this thesis is to do a broad survey of systems available on the market now (both
in industry and academia) and then compare and contrast these systems to an “ideal” system,
which we attempt to define.

To do this we survey academic and commercial literature from many sources and selected the
most popular, current, or interesting of the designs—then compare the relative strengths and
weaknesses of these designs.

The project was able to achieve a high success rate in the use for conducting elections as it was
able to stamp multiple registrations by voters through the combined use of both the unique voter
identification number.

This effectively solved all questions that may arise on eligibility of voters and accreditation
hiccups.

Voters can thus proceed to the e-voting system module of the project to cast their votes through
the server – connected device using the voter identification number, security answer keyed in
during the registration process as well as a token key that was generated automatically for each
voter per election on this module module. [1] Christopher Andrew Collord

1
1.2 BACKGROUND OF THE STUDY
The e-voting system is a term encompassing several different types of voting embracing both
electronic means of counting votes.

Electronic voting technology can include punched cards, optical scan voting systems and
specialized voting kiosks (including self contained direct-recording electronic voting systems or
DRE). It can also involve transmission of ballots and votes via telephones, private computer
networks, or the internet. [2] mohamed abdulsalah

E- voting is an electronic way of choosing leaders via a web driven application. The advantage of
E- voting over the common “queue method” is that the voters have the choice of voting at their
own free time and there is reduced congestion. It also minimizes on errors of vote counting. The
individual votes are submitted in a database which can be queried to find out who of the aspirants
for a given post has the highest number of votes.

With the “E- VOTING SYSTEM”, a voter can use his\her voting right easily without any
difficulty. He\She has to register as a voter first before being authorized to vote. The registration
should be done prior to the voting date to enable data update in the database.

However, not just anybody can vote. For one to participate in the elections, he/she must have the
requirements. For instance, he/she must be a registered citizen i.e. must be 18 and above years old.
As already stated, the project ‘E- Voting' provides means for fast and convenient voting and access
to this system is limited only to registered voters.

Internet voting systems are appealing for several reasons which include; People are getting more
used to work with computers to do all sorts of things, namely sensitive operations such as shopping
and home banking and they allow people to vote far from where they usually live, helping to reduce
absenteeism rate. [3] Rolf Haenni

An e-voting system must be accessible to every eligible voter, and provide a high level of
security. However, this system has been found to be vulnerable to various security challenges
and threats, including stored central data leakage/disclosure, selling of votes, and the presence of
certain malware on voter‟s machine.

2
Although, there are strong encryption schemes applicable to address issues concerning
confidentiality, integrity, and authenticity, there is need for further technological
implementations to address issues of availability, which consequently enhances overall security.

It is a complex system where every stage of its implementation must be secured.

There is a need to update voting technologies to improve trust, reliability, and convenience.

This system ensures that encrypted votes on the blockchain are reliably counted, while ensuring
voter privacy.

The primary way voters cast their ballots is by using electronic voting stations, which will send
the encrypted ballots to the blockchain.

We designed the system with the following criteria in mind, based on previous literature.

• Privacy - Keeping an individual’s vote secret

• Eligibility - Allowing only registered voters to vote, with each such voter voting only once

• Hiding interim results - Partial results should not be released during the voting period

• Verifiability - The ability to trust the vote tallying process. [4] Alessandro Aldini

1.3 PURPOSE OF THE STUDY


The most crucial factor for a system like e-VOTE to be successful is to exhibit a Voting Protocol
that can prevent opportunities for fraud or for sacrificing the voter's privacy. The Voting Protocol
that will be designed and implemented for the e-VOTE system will combine the advantages of
existing protocols and techniques, while at the same time it will aim at eliminating most of the
identified deficiencies and problems. The related attributes that the eVOTE system will fully
support, and against which it will be extensively tested and validated, are listed below. These
attributes can be also considered, according to the literature, as a set of criteria for a "good"
electronic voting system that can easily enjoy the trust and confidence of the voters and process
organizers.The system will reduce the materials required for printing and distribute ballots, the
personnel required to assist in voting stations reduces and greater accessibility for the old and
disabled people increase and allows to accommodate them as they cast their votes comfortably at
their own home. [5] peter wolf

3
1.4 OBJECTIVE OF THE STUDY

 Democracy: The system should be "democratic" in the sense that:


it will permit only eligible voters to vote (eligibility) and
it will ensure that each eligible voter can vote only once (un-reusability).
 Privacy: The system should ensure that:
none of the actors involved in the voting process (organizers, administrators, voters
etc.) can link any ballot (contextually) to the voter who cast it, and
that no voter can prove that he or she voted in a particular way (untraceability).
 Integrity: The necessary mechanism should be employed in order to guarantee that:
no one can duplicate his or someone else's vote (unduplicability) and
no one can change someone else's vote (unchangeability)
 Accuracy:
The system functionality should ensure that noone can falsify or modify the result of the
voting by eliminating a valid vote or counting an invalid vote in the final tally.
 Verifiability:
The system should allow and support anyone to independently verify that all votes have
been counted correctly.
 Convenience:
The system should allow and assist voters to cast their votes quickly, in one session, and
with minimal equipment or special skills.
 Efficiency:
The election can be held in a timely manner (i.e. all computations during the election are
done in a reasonable amount.

1.5 SCOPE

The Public opinion in universities setting are the most important determinant to establish a good
administration. Voting is the process through which individuals convey their opinion and has the
freedom to elect a leader of the choice to signify and address the student’s issues. In today’s
technological and knowledge age, computerized related matters become widespread.

4
E-voting is one of these substances and it is capable to deliver appropriate, less costly, fast and
secure services.

The aim of this paper is to present an electronic voting system (EVoting) to be applied to UoB
University student’s electoral body. Several security measures were integrated into the E-Voting
system in order to achieve an enhanced, speedy and accurate performance.

E- VOTING SYSTEM aims making the voting process easy in private environment. Presently
voting is performed using ballot paper and the counting is performed by the persons, hence it
consumes a lot of time. There can be possibility of invalid votes. All these make election a
tedious task. In our proposed system voting and counting is done with the help of computer. It
saves time, avoid error in counting and there will be no invalid votes. It makes the election
process easy. This project is a cyber-voting technique.

1.6 PROBLEM STATEMENT

In any instance of an election involving the academic staff of the University of UoB, it has

been observed that there are primarily two major issues that are usually sources of problems to
the voting population.

Firstly, it is usually commonplace that dispute over the issue of Eligibility or otherwise of the
staff voters arise a lot. This is partly due to the varying staff levels on the academic ladder and

also due to the time difference between dates of promotion to the next level.

Secondly, there are always incidences of staff voters been required to wait on long queues

during election period thus leading to a situation where they are tired before they get the chance

to cast their vote and also due to the presence of the queue, aspirants and their campaign teams

often exploit the situation to coerce voters into voting for them since all parties in the election

are physically present.

5
The above factors combined to create a situation whereby any staff election is deemed not

credible, and fair. Thus, there exists a vacuum for a system with features that would curb the

inefficiencies of the current system.

As the statistics shows that the percentage of polling on the day of elections is not satisfactory as
majority of student are not coming to vote and thinks is just as a waste of time. The manual
voting system takes long time as there is a lot of paper work first and then human efforts is also
there for counting of the votes.

The voting of the university elections will be done E- such that there is no need to come at the
college on the time of elections and the student can vote from the home or from any other place
with internet coverage. A USER ID and PASSWORD will be provided to every student of the
college so that on the time of elections they can easily login on the election link and use his/her
vote.

1.7 PROJECT OUTLINE

This work is divided into six chapters, carefully organized as follows:

Chapter one of this project gives an introduction to the project, explaining the purpose, scope,

and, approach of the project.

Chapter two, the literature review, gives an explanation of concepts, theories, and protocols
employed in the course of the project.

Chapter three gives research methodoly and analysis of the project. and a step by step guide to
the design of the E- Voting System

with Biometric Authentication for UI Election.

Chapter four gives each stage of prototype development in detail and a step by step guide to the
design of the E- Voting System.

6
Chapter five gives the process of implementing and testing of the project.

Chapter six gives a summary of the entire project and conclusions drawn up at the end of the

project as well as recommendations.

7
CHAPTER II: LITERATURE REVIEW

2.1 VOTING SYSTEMS


There are two categories under which voting systems can be classified, namely:

 Traditional or Paper – Ballot Voting Systems


 Electronic Voting Systems

2.2 PAPER-BALLOT VOTING SYSTEMS

The paper-based voting system can be described as the traditional means of voting that has

been in used over the ages. It is also the default method of conducting elections in the world.

It operates by issuing paper ballots to eligible voters who present themselves at the polling unit

on the day of the election. The voter is authenticated by searching for and ticking his or her

name on the voters register for that particular polling unit.

Indelible ink is used to mark an authenticated voter by dropping the ink on the voter’s left thumb
fingernail.

The voter is then expected to proceed to a secret booth to vote a candidate by pressing his right

thumb into an ink stamp and placing the inked fingerprint in front of the chosen candidate on

the ballot paper given and subsequently required to drop the ballot paper into a ballot box

placed in an open place within the polling unit. [6] william j.buchanan

After the close of polls or voting for the election, the election ballot box for the polling unit is

opened by the polling officer, the ballots are counted by the various election judges such as

election agents and election officials and the total vote results are reported and entered onto the

election results sheet which is also required to be signed by all election judges as well as

observers present thus giving authenticity to the declared results.

8
2.2.1 CHALLENGES OF PAPER-BASED VOTING SYSTEMS

The use of paper ballot comes with its own set of challenges as enumerated below:

 LOW RELIABILITY: It is easily breached at times due to the multiple avenues

that exists for the voters to make error. Paper ballots constitute a single point of failure

if lost or damaged, as ballots or choices cannot be copied without loss of fidelity. It also

depends a lot of human judgment to ascertain “Voter intent” and not neglecting the fact

that paper is essentially an analogue medium.

 POOR SECURITY: It can be seen that no checksum or encryption is possible

as data must be presented in clear text. Paper ballot can thus be manipulated by hand

even by the least of technical personnel and cases of Ballot Box stuffing during and

after elections are often rampant. Voters are often at the mercy of political thugs and

security personnel.

 HIGH COSTS: There are often high cost incurred during the printing of various

election materials, purchase of paper-handling equipment as well as the cost needed to

store and transport the materials.

 VOTER INTIMIDATION: There has been cases of harassment of voters during

elections, voter coercion and issues of ballot counting discrepancies

 QUEUEING: In cases of high voter turnout, there is usually a high probability that

queues would be formed by voters often subject to the unpredictable weather conditions

such as rains or scorching sun.

9
2.3 ELECTRONIC VOTING SYSTEMS

Electronic voting (e-Voting) as “the use of electronic means in at least the casting of the vote” it
is a term encompassing several different types of voting, embracing both electronic means of
casting a vote and electronic means of counting votes.
Electronic voting systems are complex distributed systems, whose components range from
general-purpose PCs to optical scanners and touch-screen devices, each running some
combination of commercial off-the-shelf components, proprietary firmware, or full-fledged
operating systems.
Now due to rapid emergence of technologies in computer and telecommunication world e-Voting
based systems are to be introduced that lessens all the traditional manual election systems’
problems.

With the introduction of e-Voting systems our elections processes and social lives are going to
be easy, efficient and low-cost. Now in this system voters can cast their votes from anywhere in
world. E-voting system must meet security requirements such as confidentiality, integrity,

fairness, forgery attack, verifiability and so on.

This is because E-voting system is more vulnerable than traditional voting due to the nature of
digital processing of election data which can be easily manipulated, hence may result in
widespread fraud and corruption.

The ultimate aim of e-Voting is to provide voters a good environment so that voters can cast
their votes with minimum cost and efforts on the internet.

Up to now there are so many properties have been proposed to make the e-Voting secure
process, among them some are the below given must be satisfied.

1. Eligibility: Only eligible voters are permitted to cast their ballots.

2. Privacy: There is no association between voter's identification and a marked ballot.

3. Uniqueness: No voter can cast his ballot more than once.

10
4. Completeness: No one can forge a valid ballot and a voter's ballot cannot be altered,

the valid ballots are counted correctly.

5. Fairness: No one can falsity the result of voting.

6. Verifiability: Voters can verify that their ballots are counted correctly.

7. Uncoerciability: No voter can prove what he voted to others to prevent bribery.

8. Efficiency: The computations can be performed within a reasonable amount of time.

9. Mobility: The voter can vote anytime and anywhere through internet.

2.4 REVIEW OF RELEVANT LITERATURE AND OPINION

Currently in UOB elections are done using the old age manual ballot system. A list of the
students vying for the Students Council has their names outlined so that the school can get to
know them. After a week of campaigns the elections are done.

List of all the students in UoB is availed to their respective departments. On the polling day,
students queue for a chance to vote a list of leaders in the different positions. At the voting room,
a student is verified using their Student ID to ascertain that they are genuine students of the
campus. Their names’ are crossed off and each is given ballot papers where they check their
candidates. Afterwards the votes are cast and the student leaves the room.

After the day is over, the tallying is done and depending on when it’s done, the results are
announced that day late in the night.

Elections allow the students to choose their representatives and express their preferences for
how they will be governed.

Naturally, the integrity of the election process is fundamental. The design of a good voting
system, whether electronic or using traditional paper ballots or mechanical devices must satisfy a
number of sometimes competing criteria.

11
The anonymity of a voter’s ballot must be preserved, both to guarantee the voter’s safety when
voting against a malevolent candidate, and to guarantee that voters have no evidence that proves
which candidates received their votes.

The existence of such evidence would allow votes to be purchased by a candidate. The voting
system must also be tamperresistant to prevent a wide range of attacks, including ballot stuffing
by voters and incorrect tallying by insiders.

12
CHAPTER III: RESEARCH METHODOLOGY

3.1 RESEARCH METHODOLOGY

In this chapter, the source of data methods of collection, the evaluation of the existing system
and the organization structure of the system problem are presented.

3.2 What is System Analysis?

A system is a collection of activities and elements organized to accomplish a goal. In system


analysis, data is collected about the present system.

The data is then analyzed and new requirements are determined. System analysis is on
determining the requirement for a new system. Three main tasks are gathering data, Analyzing
the data, and documenting the analyses.

• Gathering data is done by observation, interviews, and questionnaire and looking at documents,
one of which is the organization chart which shows an organizers foundations and levels of
management.

• Analyzing data: there are several tools for the analyzing of data which includes checklist,
decision tables and system flows charts.

• Documenting system analysis: To document and to communicate the finding of phase two, a
system analysis report is prepared for higher management.

3.3 METHODS OF DATA COLLECTION

3.3.1 Studying of Procedures Manuals

Written documents on voting System was read to obtain information on how the system works.
This form of date collection was usefull in the sense that it sealed light into the present voting
system an also enable the system.

13
3.3.2 Evaluation of forms

These provide information that is required within a section of the system and what is contained
in. The printed output form shade more knowledge on which department representatives receive
each document and where it is sent to after is has being uses.

3.3.3 Interviewing of departmental representatives

After obtaining thorough understanding of preset system through evaluation of present system
through evaluation of forms and manuals .we wert further to interview the representatives
involve in the actual operation of the system.These people explained more or the system and the
basic reliable because the system put into consideration the basic flows.

3.4 ANALYSIS OF THE EXISTING SYSTEM

Manual systems put pressure on people to be correct in all details of their work at all times, the
problem being that people aren’t perfect, however much each of us wishes we were.

With manual systems the level of service is dependent on individuals and this puts a requirement
on management to run training continuously for staff to keep them motivated and to ensure they
are following the correct procedures.

It can be all to easy to accidentally switch details and end up with inconsistency in data entry or
in hand written orders. This has the effect of not only causing problems with customer service
but also making information unable be used for reporting or finding trends with data discovery.

Reporting and checking that data is robust can be timely and expensive. This is often an area
where significant money can be saved by automation. It takes more effort and physical space to
keep track of paper documents, to find information and to keep details secure. When mistakes
are made or changes or corrections are needed, often a manual transaction must be completely
redone rather than just updated.

14
With manual or partially automated systems information often has to be written down and copied
or entered more than once. Systemisation can reduce the amount of duplication of data entry.

Another impact of manual systems is on Customer service. Customer queries can be difficult to
respond to as information is stored in different places and may even require that you find the
right person before being able to respond. This is no good if they are out to lunch or only work
part time.

3.5 PROBLEM OF THE EXISTING SYSTEM

1. registration of candidates 2. preparation of polling list

3. counting of votes 4. operation threat

5. attitude of voting 6. selection not election

3.6 SOLUTIONS OF THE EXISTING PROBLEM

(A). A stable solution to all these problems is the use of computerized system (E-voting system)
for high processing speed, minimum number of staff.

(B). Change of attitude by all- election anomalies that we all experience now are rooted in
attitude of all stakeholders in the electoral system. Voters should change their attitude of
believing in money polities.

15
CHAPTER IV: PROTOTYPE AND DESIGN

4.1 DESIGN GOALS FOR THE PROPOSED SYSTEM

Some of the overall design goals of the new E- Voting System are listed below:

 Voter secrecy: No one should know what the voter voted


 Voter authentication: Voters should be who they claim they are
 Verifiability of votes: Internal tracking of votes, to assure all ballots are registered to a
 voter.
 Accuracy of voter turnout. Each voter is tracked to completion, so voter data is available
 at any time.
 Safe transfer of votes from user’s computer to the server
 Safety of casted votes: Proper security process and user registration can guarantee ballot
 assurance.
 Uniqueness of casting – A person can cast only one vote
 Permitting the voter to vote for as many candidates for an office as the voter is lawfully
 entitled to vote for without exceeding the limit
 Empty ballot box at the start of voting
 Voter should be able to verify the vote before it is cast
 User manuals should be provided for voters several days before election

4.2 FUNCTIONAL REQUIREMENTS OF THE PROPOSED SYSTEM

Functional requirements are the capabilities of the system and domain specific.

The system should have the following functional requirements:

 The system must provide the voters with accurate data


 The system must supply standard reports for decision making
 Audit trails of who made changes to the database must be maintained
 The system should allow voting administrators to make updates to the voter information

16
 database
 The system must provide standard error checking
 The system must provide data integrity checks to ensure data remains consistent and
 updated.
 The system should provide documentation to inform users of system functionality and
 any change to the system.

4.3 SECURITY REQUIREMENTS

The E- Voting System would be required to enforce the following security rules or requirements
in order to fully satisfy and build the trust of the voting populace in the system.

The security requirements are listed below:

 The voting system should include controls to prevent deliberate or accidental attempts
 to replace code such as unbounded arrays and strings
 The system should have zero-tolerant with regard to compromising
 Election process should not be subject to any manipulation including even a single vote
 manipulation
 The system should provide accurate time and date settings
 The system should not allow improper actions by voters and election officials
 The system should not allow unauthorized users to download votes to infer how voters
 have voted
 The system should provide means for protecting and securing recounts of ballots cast
 in elections

4.4 DESIGN OF THE PROPOSED SYSTEM

Having defined the requirements of the proposed system, I now present the system’s design

which will include the use of software modelling tools to structure requirements. Structuring

requirements help us to understand requirements thoroughly. It is important to have standard

notations for modelling, documenting, and communicating decisions.


17
In looking at the functionality of the proposed E- voting system we use data flow diagrams.

4.5 DATA FLOW DIAGRAMS (DFDS)

Data-flow diagram is a model that shows the graphical flow of data through an information
system, the relationships among the data flows, and how data come to be stored at specific
locations. Data-flow diagrams also show the processes that change or transform data. Data
flow diagram focuses on the movement of data between processes, called process models.
4.5.1 ADMIN FLOWCHART

Admin login
Incorrect user
User name & password correct or password

dashboard invalid

Election title

Ballot positions

cadidates
Votes

Voters positions

18
4.6 VOTER REGISTERING

This is a major functional requirement of the system. ADMIN will register voter’s name &
password after that the system will give voter’s id automatically.

Voter registration establishes the eligibility of individuals to vote. As one of the more costly
time-consuming and complex aspects of the electoral process, it often accounts for a
considerable portion of the budget, staff time and resources of an election management
authority. If conducted well, voter registration confers legitimacy to the process. The entire
electoral process may be perceived as illegitimate should the registration system be flawed .

The primary purpose of the voters’ list is to confirm the individual’s eligibility to vote in
national and/or provincial, regional or local elections. A voters’ list enables the election
management authority to separate the function of verifying eligibility from the function of
controlling the legitimacy of the voting process. A registration effort determines eligibility in
advance of Election Day; as a result, the election management authority can administer the
election efficiently, while minimizing waiting times for voters. Procedures that reduce the
effort voters must make to vote are important given the steadily decreasing turnout rates in
many democracies.

4.7 CANDIDATE REGISTERATION

A fair and equitable candidate registration process is important to maintain electoral integrity.

A clear, standardized and reasonable process facilitates the equal treatment of potential
candidates and helps ensure each candidate has an equal opportunity to register.

Candidate registration is an important part of the electoral process. Having a competit ive
process, where potential candidates understand the requirements and are able to register if
qualified, is important. Integrity problems can be avoided when the process is transparent and
scheduled far enough in advance in the electoral calendar so candidates have time is prepare
their applications, and for electoral managers to review the applications and notify candidates of
their decision, before the start of the electoral campaign period.

19
As in the registration of voters and political parties, integrity concerns include having reasonable
eligibility requirements, a fair and transparent review of the application, timely notification of
acceptance or rejection, and the right to an appeal if required.

4.8 VOTES

Electronic voting and counting refers to the use of electronic technologies that assist or automate
the voting and/or counting processes. In electronic voting, often called "e-voting," voters use an
electronic device to make and record their ballot choices.

Choices are recorded on the machine it self , and automatically shows number of votes for each
candidate.

20
CHAPTER V: TESTING AND RESULT

5.1 INTRODUCTION

Information Processing has undergone major improvements in the past two decades in both
hardware and software. Hardware has decreased in size and price, while providing more and
faster processing power. Software has become easier to use, while providing increased
capabilities. There is an abundance of products available to assist both end-users and software
developers in their work. Software testing, however, has not progressed significantly. It is still
largely a manual process conducted as an art rather than a methodology. It is almost an accepted
practice to release software that contains defects.

Software that is not thoroughly tested is released for production. This is true for both off-the-
shelf software products and custom applications. Software vendor and inhouse systems
developers release an initial system and then deliver fixes to the code. They continue delivering
fixes until they create a new system and stop supporting the old one. The user is then forced to
convert to the new system, which again will require fixes.

In-house systems developers generally do not provide any better level of support. They require
the users to submit Incident Reports specifying the system defects. The Incident Reports are then
assigned a priority and the defects are fixed as time and budgets permit.

5.2 IMPORTANCE OF TESTING

Testing is the process of running a system with the intention of finding errors. Testing enhances
the integrity of a system by detecting deviations in design and errors in the system.

Testing aims at detecting error-prone areas. This helps in the prevention of errors in a system.
Testing also adds value to the product by conforming to the user requirements.
The main purpose of testing is to detect errors and errorprone areas in a system. Testing must be
thorough and well-planned. A partially tested system is as bad as an untested system. And the
price of an untested and under-tested system is high.

The implementation is the final and important phase. It involves user-training, system testing in
order to ensure successful running of the proposed system. The user tests the system and changes

21
are made according to their needs. The testing involves the testing of the developed system using
various kinds of data. While testing, errors are noted and correctness is the mode.

5.3 TESTING DEFINITIONS

Software development has several levels of testing.

• Unit Testing

• Systems Testing

• Acceptance Testing

5.3.1 UNIT TESTING

The first level of testing is called unit testing which is done during the development of the
system. Unit testing is essential for verification of the code produced during the coding phase.
Errors were noted down and corrected immediately. It is performed by the programmer. It uses
the program specifications and the program itself as its source. Thus, our modules are
individually tested here. There is no formal documentation required for unit-testing program.

5.3.2 INTEGRATION TESTING

The second level of testing includes integration testing. Here different dependent modules are
assembled and tested for any bugs that may surface due to the integration of modules. Thus, the
administrator module and various visa immigration modules are tested here.

5.3.3 SYSTEM TESTING

The third level of testing includes systems testing. Systems testing verify that the system
performs the business functions while meeting the specified performance requirements. It is
performed by a team consisting of software technicians and users. It uses the Systems
Requirements document, the System Architectural Design and Detailed Design Documents, and
the Information Systems Department standards as its sources. Documentation is recorded and
saved for systems testing.

22
5.3.4 ACCEPTANCE TESTING

The final level of testing is the acceptance testing. Acceptance testing provides the users with
assurance that the system is ready for production use; it is performed by the users. It uses the
System Requirements document as its source. There is no formal documentation required for
acceptance testing.

5.4 SYTEM TESTIN AND SCREEN SHOOTS

For the Admin, here are the steps for executing the system. The first thing to do is to Login :

Enter the user name and the user password, then after clicking “enter” the system will proceed to
the main menu.

23
You can search the names of the voters at the right side search bar and check if they were
registered or not, if not, Click the “voters” and then click “add”. Now you can add voter’s data
for registration.

After adding voter, click the save icon at the top-right corner to save the data, now the voter is
registered. You can also edit the data of the voters with the same procedure

To add a voter:

24
For adding candidates, click the “candidates” button at the left side menu then “manage
candidates” to add candidates.

25
Edit the data of the candidates at the form “manage candidate” and click the save icon to add the
candidate from the list

26
after registering candidates and voters then the votes will begin.

To start voting voters should know their usernames and passwords to login.

If the voter’s username and password are correct , then your will 27horoughly go to candidates and select
your candidate.

27
CHAPTER VI: CONCLUSION AND SUGGESTION

6.1 CONCLUSION

Now a days, Information systems and Communication Technologies (ICT) are being integrated
into different stages of electoral process globally and thus it is becoming essential to explore
methods for secure electronic voting.
Identification of appropriate technology and its extent to use for secure electronic voting is the
prime concern in electoral process. Success of electronic voting depends on trust level and thus
security issues need to be addressed properly in design process keeping in mind the social and
political implications.
Such trust can’t be accessed only in terms of political and sociological but also as trust in
technology being used. This thesis considered electronic voting mainly as security critical
process. This thesis attempts to identify the different issues in electronic voting while focused
mainly on security aspect to deploy a voting system in a secure manner satisfying expected
assurance at technical and procedural levels.
Thus the project on E- voting system was done. The main aspects that are behind E-
voting system is that they enabled us to bring out the new ideas that sustained within us for many
days.
This project will be a successful one because this project offers the voters to cast their vote
easily through internet and also counting votes are made easy.
This E- Voting system will manage the Voter’s information by which voter can login and use his
voting rights. The system will incorporate all features of Voting system. It provides the tools
for maintaining voter’s vote to every party and it count total no. of votes of every party.
Voting detail store in database and the result is displayed by calculation. By E- voting system
percentage of voting is increases. It decreases the cost and time of voting process. It is very easy
to use and It is varying less time consuming. It is very easy to debug.

This chapter concludes the thesis summarizing main contribution and discusses their
extendibility. The proposed model and framework enhances the security issues into the
electronic voting system with respect to eliminating bogus voting and vote repetition, less

28
election expenditure, more transparency and fast results. The context and the validity of the
problem space are established through a comprehensive review of relevant research.

6.2 SUGGESTION

After my research and my finalization of this project, I highly recommend that the E- voting
system (OVS) serves to be the best to be put in use especially in the 21st century where human
beings are embracing technology and where there is malicious struggle for power by leaders all
over the world. This struggle for power has resulted in the use of all approaches by the leaders in
power to remain in their positions at whatever costs even if it means applying vote rigging to win
elections. With this system in place, a number of such problems shall be forgotten.

In order to be sure that our team is developing the right project that fulfills requirements
provided in this document our team will get familiar with the idea of the project and suggest
other features that would make it even more functional.

Reliable and secure electronic voting system presented in this thesis is promising; still there is
scope for improvement in the proposed framework. In future, this framework can be updated to
support Internet voting.

The same system can be extended to perform the function of counting the number of votes casted
and announcing the results immediately. We can include an administrator mode in which the
user details can be updated dynamically through the application only. In near future we can even
implement the system in mobile phones. The user can access the website through mobile phone
and cast the vote.

29
6.3 REFERENCES

Books referred:

Janet Valade, PHP and MySql for Dummies, 3rd Edition.

Earle Castledine and Craig Sharkie, First Edition February 2010, JQuery from Novice to Ninja.

Websites referred:

www.E-voting.com

www.google.com

www.php.net

www.apache.org

www.mysqltutorial.org

30

Вам также может понравиться