Sei sulla pagina 1di 53

E-Voting

CHAPTER 1
INTRODUCTION
Elections allow the populace to choose their representatives and express their
preferences for how they will be governed. Naturally, the integrity of the election
process is fundamental to the integrity of democracy itself. The election system must
be sufficiently robust to withstand a variety of fraudulent behaviors and must be
sufficiently transparent and comprehensible that voters and candidates can accept the
results of an election. Unsurprisingly, history is littered with examples of elections
being manipulated in order to influence their outcome.
1.1 Purpose of project:

Voting system organizes record of vote


It reduces the paper work and semi automates the procedure of voting system.
It makes the record storing, Updating, Deleting process easier.

1.2 Scope of project:

Voter will be able to vote from anywhere for his/her Constituency.


Vote counting will become easy and fast.
No Vote will be rejected.

CMCS, YTL (2015-16)

E-Voting

CHAPTER 2
PROJECT ANALYSIS
2.1 Existing system:
The voter has to visit the booths to vote a candidate so there is wastage of time.
The voter has to manually register into the voter List. Also vote counting has to be

done manually.
All the information of the voter or candidate is to be filling in manually.
Voter must be present in his/her constituency to give his/her vote.
The existing system of Election is running manually.
There are electronic voting machines used which increases the cost of carrying out
the election.

2.2 Proposed system:


Maintain all information of all the candidates and votes.
Check whether voter have voted or not.
Increase the voting percentage.
To make voting an easy process by avoiding problems like
o Security
o Booth capturing

2.3 H/W and S/W Requirements:


Hardware Requirements

Pentium IV Processors or above.


512 RAM or above.

Software Requirements

CMCS, YTL (2015-16)

E-Voting

Any Operating System (e.g. Win XP, Win 7/8)


Web Browser-Internet Explorer 6 or above with java script enabled.

2.4 FEASIBILITY STUDY

A feasibility study is a short, which aims to answer a number of questions.


Does the system contribute to the overall objectives of the Organization?
Can the system be implemented using current technology and within given

cost and schedule constraints?


Can the system be integrated with systems which are already in place?

Feasibility study is an essential part for developing any software we study


present manual system, we calculation to cot required for maintaining various record.
The space required for keeping the cost of manual staff and time required for
manual system was more.
A feasibility study is carried out to select the best system that must
performance requirement and its working ability in an organization. The feasibility of
the system has been done in five types:
1. Operational feasibility study
2. Technical feasibility study
3. Schedule feasibility study
4. Economical feasibility study
5. Implementation feasibility study

CMCS, YTL (2015-16)

E-Voting

2.4.1 Operational feasibility:


The system must be evaluated from the technical point of view. The
assessment of this feasibility must be based on an outline design of the system
requirement in the terms of input, output, programs and procedures, Having identified
an outline system, the investigation must go on suggest the type of equipment,
required method developing the system, of running the system once it has been
designed.
Technical issues raised during the investigation are:
Does the existing technology sufficient for the suggested once one?
Can the system expand if developed?
Considering various user for the application w have done operational
feasibility of the proposed operationally and easy to use by the users. The application
must capable of performing some automatic operation which helps the user for easy
functionality
Operational feasibility measures how well the solution will work in the
organization and how will end-user & management feels about the system? Proposed
system as helpful for all the stakeholders associated with the organization. It will
allow the employees to have up-to-date information regarding all the aspects of their
respective departments. The decision-making process will also become faster with the
use of data integration, consolidation and computation power available at all the
nodes in the organization.
On studying the operational feasibility of the project, the following
conclusions could be derived.
Developed system will provide the adequate throughput and all necessary
information to end-users.
It will provide efficient and cost-effective access to up-to-date data.

CMCS, YTL (2015-16)

E-Voting

If installed within suitable environment, system will do operations under


environment of limited resources.
Thus, it is operationally feasible to develop the propose system.

2.4.2 Technical feasibility:


Technical feasibility tries to answer the following questions to make the
software feasible to develop.
The software or tools necessary for building or running the application are
easily available or not?
The compatibility amongst software exists or not?
Are developers aware of these technologies?
What about the alternative of these chosen technologies?

2.4.3 Schedule feasibility:


Projects are initiated with specific deadline. We need to evaluate whether the
deadlines are mandatory or desirable. Time is the one of the critical factor in the
development of any system but this kind of feasibility is hardly perfect in any system.
Hence, it is feasible to develop a system in predetermined time interval.

CMCS, YTL (2015-16)

E-Voting

2.4.4 Economical feasibility:


The developing system must be justified by cost and benefit. Criteria to ensure
that effort is concentrated on project, which will give best, return at the earliest. One
of the factors, which affect the development of a new system, is the cost it would
require.
The following are the some of the important financial questions asked during
preliminary investigation:
The cost conducts a full system investigation.
The cost of the hardware and the software.
The benefits in the form of reduce costs or fewer costly errors.
Since the system is developed as part of project work, there is no manual cost
to spend for the purposed system. Also the resources are already available, it give an
indication of the system is economically possible for development.
Economic feasibility addresses to the following issues:
How much profit can be earned from the system by an organization?
Is the organization having the suitable budget to develop the proposed
system?
Would it be cost-effective to develop the system or it is worthwhile to
remain with current system?

2.4.5 Implementation feasibility:

CMCS, YTL (2015-16)

E-Voting

Under the study of Implementation feasibility, weve got to draw the finger to
the certain issues, like
Is it possible to install the software within the given environment?
Will organization management and user support for the installation of the
software?
Will proposed system cause any harm to the operations of the organization

CHAPTER 3
SYSTEM DEVELOPMENT ENVIRONMENT
3.1 Front end:

Java language:
Java is an innovative programming language that has become the language of

choice for programs that need to run on a variety of different computer systems. First
of all, Java enables you to write small programs called applets. These are programs
that you can embed in web pages to provide some intelligence. Being able to embed
executable code in a web page introduces a vast range of exciting possibilities. Instead
of being a passive presentation of text and graphics, a web page can be interactive in
any way that we want.
Javas support for the Internet and network-based applications generally
doesnt end with applets. For example, Java Server Pages (JSP) provides a powerful
means of building a server application that can dynamically create and download
HTML pages to a client that are precisely customized for the specific request that is
received. Of course, the pages that are generated by JSP can themselves contain Java
applets. Java also allows us to write large-scale application programs that we can run
unchanged on any computer with an operating system environment in which Java is
supported. This applies to the majority of computers in use today. We can even write
programs that will work both as ordinary applications and as applets.

CMCS, YTL (2015-16)

E-Voting

The most important characteristic of Java is that it was designed from the
outset to be machine independent. We can run Java programs unchanged on any
machine and operating system combination that supports Java. The next most
important characteristic of Java is that it is object-oriented.

Java is a high level, third generation programming language like C,


FORTRON, SMALLTALK, PERL and many others. You can use Java to write
computers application that play games, stored data or do any of the thousands of other
things computer software can do. Compare to other programming languages Java is
most similar to C. However although Java shares much of Cs syntax, it is not C
knowing how to program in C or batter yet. C++ will certainly help you to learn Java
more quickly but you dont need to know C to learn Java.
A java compiler wont compile C code and most large C programs need to be
change substantially before they can become java programs. Whats most special
about java in relation to other programming language is that it lets you write special
about java language is that it lets you write special programs called Applet that can
be downloaded from internet and placed safely within a web browser. Java language
is called as an object oriented programming languages.

History:
Java is a general purpose programming language. Object oriented
programming language develops by Sun Micro system of USA in 1991 originally
called OAK and team lead by James Gosling. The main aim had to make Java
simple, portable and reliable.
In 1995 OAK was renamed to java as it did not survive legal registration
.Many companies such as, Netscape and Microsoft announcement their support for

CMCS, YTL (2015-16)

E-Voting

java. In 1996 java language is famous for Internet programming as well as general
purpose object oriented programming.

Java virtual machine (JVM):


Java was designed with the concept of write ones and run anywhere. Java
virtual machine plays the central role in this concept. The JVM is the environment in
which java program executes. It is software that is implemented on top of real
hardware and operating system. The JVM must be implemented on a particular before
compile program can run on that platform.
The java compiler converts the source code into intermediate code is called as
Byte code. This machine is called as Java Virtual Machine and it exists only inside the
computer memory. When the source code is compiled, it is translated into byte code
and then place into file. The JVM executes this byte code. When the source code is
compiled, it is translated into byte code and then place into class file. The JVM
executes this byte code so Java byte codes can be thought of as the machine language
of JVM. A JVM can either interpret the byte code one instruction at a time or a byte
code can be compiled further for the real microprocessor using what is called a Just in
Time (JIT) compiler. The JVM must be implemented on a particular platform before
compile programs can run on that platform.

Advantages of java language:


Java program are platform independent, it can run on any PC or any
Operating system.
It is dynamic, simple and robust.
It is purely OOPs language having all the OOPs concept

Disadvantages of java language:


It takes more time to execute than C language as it runs first on JVM.
More memory consuming than other languages.

Applets:

CMCS, YTL (2015-16)

E-Voting

Applets are small applications that are accessed on an Internet server,


transported over the Internet, automatically installed, and run as part of a Web
document. After an applet arrives on the client, it has limited access to resources, so
that it can produce an arbitrary multimedia user interface and run complex
computations without introducing the risk of viruses or breaching data integrity.
An applet is a small Java program that is embedded and ran in some other Java
interpreter program such as

a Java technology-enabled browser


Suns applet viewer program called appletviewer.

3.2 Back end:


ORACLE:
An Oracle database is a collection of data treated as a unit. The purpose of a database
is to store and retrieve related information. A database server is the key to solving the
problems of information management. In general, a server reliably manages a large
amount of data in a multiuser environment so that many users can concurrently access
the same data. All this is accomplished while delivering high performance. A database
server also prevents unauthorized access and provides efficient solutions for failure
recovery.
Oracle Database is the first database designed for enterprise grid
computing, the most flexible and cost effective way to manage information and
applications. Enterprise grid computing creates large pools of industry-standard,
modular storage and servers. With this architecture, each new system can be rapidly
provisioned from the pool of components. There is no need for peak workloads,

CMCS, YTL (2015-16)

10

E-Voting

because capacity can be easily added or reallocated from the resource pools as
needed.
The database has logical structures and physical structures. Because the
physical and logical structures are separate, the physical storage of data can be
managed without affecting the access to logical storage structures.

CHAPTER 4
PROJECT DESIGNING
4.1. Dataflow diagram:
Context level DFD:

CMCS, YTL (2015-16)

11

E-Voting

Fig 4.1.1: context level DFD

LEVEL 1 DFD:

CMCS, YTL (2015-16)

12

E-Voting

Fir 4.1.2:level DFD

CMCS, YTL (2015-16)

13

E-Voting

LEVEL 2 DFD:
DFD FOR VOTING:

Fig 4.1.3:dfd for voting

CMCS, YTL (2015-16)

14

E-Voting

LEVEL 2 DFD:
DFD FOR ADMINISTRATOR

Fig4.1.4 DFD FOR ADMINISTRATOR

CMCS, YTL (2015-16)

15

E-Voting

4.2. Use case diagram:


A Use Case is a set of scenarios that describes an interaction between a user
and a system. A Use Case diagram displays the relationships among actors and use
cases. The two main components of a use case diagram are use cases and actors

Actor

Use Case

Fig 4.2.1 USE CASE DIAGRAM

An actor represents a user or another system that will interact with the system
your modeling. A use case is an external view of the system that represents some
action the user might perform in order to complete a task. The use case diagrams in
our project are drawn for:
1. Administrator
2. Vote

CMCS, YTL (2015-16)

16

E-Voting

1 Administrator

Party Description

Parliament Participants
Administrator
Assembly Participants
Fig. 4.2.1.2 Administrator

Description:
This is the use case for the administrator in which he can perform various
operations like enter party description, parliament participants details and assembly
participant details.
Actor:
Administrator
Preconditions:
The administrator should enter a valid Username and password in login screen
to perform the operations. Addition of record is done if the record does not exist in the
database. Modification of a record is done for an existing record.
Post conditions:
The administrator can perform various operations like enter party description,
parliament participants details and assembly participants details
Main flow:

CMCS, YTL (2015-16)

17

E-Voting

The administrator can perform operations like enter party description,


parliament participant details and assembly participant details. The administrator
enters the details in the various screens provided accordingly.

2. Voter

Registration

Parliament vote

Assembly vote

Fig. 4.5 Voter


Description:
This is the usecase for the Voter where the voter can register and he vote for
parliament as well as assembly. He can view the participants details.
Actor:
Voter.
Preconditions:
The voter enters the URL and the homepage for the voter opens up.
Postconditions:
When the voter enters the proper URL he can view all the data but he cannot
edit anything. Only he can register and vote the participants
Mainflow:

CMCS, YTL (2015-16)

18

E-Voting

The voter can register and he vote for parliament as well as assembly. He can
view the participants details.

4.3Class Diagram
Class Diagrams are widely used to describe the types of objects in a system
and their relationships. Class Diagrams model class structure, and contents using
design elements such as classes, packages and objects. Classes are composed of three
things:
They are as follows:
Name

CMCS, YTL (2015-16)

19

E-Voting

Attributes
Operations

Conceptual Model

CMCS, YTL (2015-16)

20

E-Voting

MP and MLA Records according to party


-Name: char
-Age: int
-Birth place: char
-Participating place: char

Administrator
- UserName: Char

-Educational Back ground: char


-Property value: int
-Police Record: char

get Password ( )

getMPParticipantDetail ( )
getMLADetails ( )
getPoliceRecords ( )
setPoliceRecords( )
getEducationRecord ( )
setEducationRecord ()
getPropertyValue( )
setPropertyValue( )

- Password: Char
getUserName ( )

Partys Desc
-Party Name: char
-MP Name: char
-MLA Name: char

. getPartyDetails ( )
getPartyMP ( )
getPartyMLA ( )
setPartyMessage ( )
getLeaderMessage (
setParticipantDesc (

Enter Data

Registration
-NSSN: varchar
-First Name: char
-Last Name: char
-Date of birth: int
-Division: char
-Village: char

voter
-Enter Vote

getPartyDetails ( )
getPartyMP ( )
getPartyMLA ( )
getNssn ( )
setNssn ( )
getVoterId( )
setVoterId( )
getDateofBirth( )
setDateofBirth( )
getDivision( )
setDivision( )
getVellage( )
set

CMCS, YTL (2015-16)

getPartyDetails

21

E-Voting

Conceptual Model
During analysis of the problem domain, a conceptual model should be
developed based on the real-life entities within the problem space. The entities in a
conceptual model have less to do with the software components of the system and
more to do with the physical entities that are fundamental to the business. The
conceptual model usually illustrates the concepts, the relationships between them, and
the attributes that belong to each concept. The behavior usually is not represented in
this type of model. The conceptual model is developed from a set of use-cases for the
system. The purpose of building the model is to help identify the entities that most
likely will become classes in the design stage and to help better understand the
problem domain.

CMCS, YTL (2015-16)

22

E-Voting

Party Diagram:

CMCS, YTL (2015-16)

23

E-Voting

acts as

MP and 1MLA Administrator


Records according
-Password: char
to party

actsPartys
as
Description
1
-Party Name: char
-MP Name: char
1
UserName:
-MLAchar
Name: char

-Name: char
-Age: int
-Birth place: char
-Participating place:
char

Enter Data

Participant Details and vote

-Educational Back
ground: char

-Particip-ant name: char


Views
-Location: char
&
voter
-Status: char
-Description: char Gives
Feedback
-Enter Vote

Registration
-NSSN: varchar
-First Name: char
-Last Name: char
-Date of birth: int
-Division: char
-Village: char

Fig Party Daigram

4.4Sequence Diagrams

CMCS, YTL (2015-16)

24

E-Voting

These are the diagrams, which uses the objects of the classes and shows the action
sequence. With these diagrams, we can know the sequence of the commands. .

Fig: Sequence Diagram

When the administrator enters the username and password then the database is
verified and if these are valid, then the administrator can get the administrator session.
CMCS, YTL (2015-16)

25

E-Voting

Here, he can add the data and he can modify the files. The arrows shown in the
diagrams will tell us about the command from one operation to another operation
class. The tail of the arrow contains from class and the head of the arrow contains to
the class.

4.5Collaboration Diagrams
The collaboration diagrams are the diagrams generated from the sequence
diagrams. Here we can see the sequence numbering for the commands. The boxes are
the objects of the classes.

CMCS, YTL (2015-16)

26

E-Voting

Fig: Collaboration Diagram

The above given is the collaboration diagram of the administration session.


Here, we can get the details of the commands according to their sequence. When the
administrator enters the username and password then the database is verified and if
these are valid, then the administrator can get the administrator session. All the
operations can be viewed here according to their number.

4.6 Database Design


NSSN Registration:
Fieldname
NSSN
FIRSTNAME
LASTNAME
DOB
NATIONALITY
GENDER
STATE
FATHER NAME
DISTRICT
MANDAL
VILLAGE
HNO

Type

Width

Description

Varchar2
20
Primary key
Varchar2
20
Not Null
Varchar2
20
Not Null
Date
Not Null
Varchar2
20
Not Null
Varchar2
8
Not Null
Varchar2
20
Not Null
Varchar2
15
Not Null
Varchar2
20
Not Null
Varchar2
20
Not Null
Varchar2
20
Not Null
Varchar2
20
Not Null
Fig4.6.1: Table name: nssnregistration

Voting Registration:
Fieldname
NSSN
VOTERID
FIRSTNAME
LASTNAME

CMCS, YTL (2015-16)

Type

Width

Varchar2
Varchar2
Varchar2
Varchar2

30
30
40
30

Description
Foreign key
Primary key
Not Null
Not Null

27

E-Voting

Date

Date

Not Null

Fig4.6.2: Table Name: votingregistration

Congo participants
Fieldname
PERSON
PARTY
POST
PERSONDESC
PLACE

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
30
10
40
30

Description
Not Null
Not Null
Not Null
Not Null
Primary key

Fig4.6.3 Table name: congoparticipents


Tdpparticipents:
Fieldname
PERSON
PARTY
POST
PERSONDESC
PLACE

Type

Width

Description

Varchar2
30
Not Null
Varchar2
30
Not Null
Varchar2
10
Not Null
Varchar2
40
Not Null
Varchar2
30
Primary key
Fig4.6.4 Table Name: tdpparticipents

Trsparticipents:
Fieldname
PERSON
PARTY
POST
PERSONDESC
PLACE

CMCS, YTL (2015-16)

Type

Width

Description

Varchar2
30
Not Null
Varchar2
30
Not Null
Varchar2
10
Not Null
Varchar2
40
Not Null
Varchar2
30
Primary key
Fig4.6.5 Table Name: trsparticipents

28

E-Voting

Trsparticipents:
Fieldname
PERSON
PARTY
POST
PERSONDESC
PLACE

Type

Width

Description

Varchar2
30
Not Null
Varchar2
30
Not Null
Varchar2
10
Not Null
Varchar2
40
Not Null
Varchar2
30
Primary key
Fig4.6.6 Table Name: trsparticipents

Bjpparticipents:
Fieldname
PERSON
PARTY
POST
PERSONDESC
PLACE

Type

Width

Description

Varchar2
30
Not Null
Varchar2
30
Not Null
Varchar2
10
Not Null
Varchar2
40
Not Null
Varchar2
30
Primary key
Fig4.6.7 Table name: bjpparticipents

Rudhranethraparticipents:
Fieldname
PERSON
PARTY
POST
PERSONDESC
PLACE

CMCS, YTL (2015-16)

Type

Width

Description

Varchar2
30
Not Null
Varchar2
30
Not Null
Varchar2
10
Not Null
Varchar2
40
Not Null
Varchar2
30
Primary key
Fig4.6.8 Table name: rudhranethraparticipents

29

E-Voting

Otherparticipents:
Fieldname
PERSON
PARTY
POST
PERSONDESC
PLACE

Type

Width

Description

Varchar2
30
Not Null
Varchar2
30
Not Null
Varchar2
10
Not Null
Varchar2
40
Not Null
Varchar2
30
Primary key
Fig4.6.9 Table name: otherparticipents

CongrasMP:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type

Width

Varchar2
30
Varchar2
5
Varchar2
30
Varchar2
10
Varchar2
30
Varchar2
30
Varchar2
30
Varchar2
10
Fig4.6.10 Table name: CongrasMP

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Congress MLA:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

CMCS, YTL (2015-16)

Type

Width

Varchar2
30
Varchar2
5
Varchar2
30
Varchar2
10
Varchar2
30
Varchar2
30
Varchar2
30
Varchar2
10
Fig4.6.11 Table name: Congress MLA

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

30

E-Voting

TDPMP:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30
30
10

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.12 Table name: TDPMP

TDPMLA:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30
30
10

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.13 Table name: TDPMLA

TRSMP:
Fieldname
PARTY

CMCS, YTL (2015-16)

Type
Varchar2

Width
30

Description
Not Null

31

E-Voting

POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

5
30
10
30
30
30
10

Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.14 Table name: TRSMP

TRSMLA:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30
30
10

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.15 Table name: TRSMLA

BJPMP:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE

CMCS, YTL (2015-16)

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key

32

E-Voting

EDUCTIONLBG
POLICERECORD

Varchar2
Varchar2

30
10

Not Null
Not Null

Fig4.6.16 Table name: BJPMP


BJPMLA:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30
30
10

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.17 Table name: BJPMLA

RudhranethraMP:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30
30
10

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.18 Table name: rudhranethraMP

CMCS, YTL (2015-16)

33

E-Voting

RudhranehraMLA:
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30
30
10

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.19 Table name: rudhranehraML

OthersMP
Fieldname
PARTY
POST
NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Type
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

Width
30
5
30
10
30
30
30
10

Description
Not Null
Not Null
Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.20 Table name: OthersMP


OthersMLA
Fieldname
PARTY
POST

CMCS, YTL (2015-16)

Type
Varchar2
Varchar2

Width
30
5

Description
Not Null
Not Null

34

E-Voting

NAME
AGE
BIRTHPLACE
PARICIPAINGPLACE
EDUCTIONLBG
POLICERECORD

Varchar2
Varchar2
Varchar2
Varchar2
Varchar2
Varchar2

30
10
30
30
30
10

Not Null
Not Null
Not Null
Foreign key
Not Null
Not Null

Fig4.6.21 Table name: OthersMLA

4.7 Screens:
Home page:

Fig4.7.1: Homepage
Admin main page:

CMCS, YTL (2015-16)

35

E-Voting

Fig 4.7.2: Admin main page

Admin home page:

CMCS, YTL (2015-16)

36

E-Voting

Fig 4.7.3: Admin home page


Add party name page:

Fig 4.7.4: Add party name page

Party selection page:

CMCS, YTL (2015-16)

37

E-Voting

Fig 4.7.5: party selection page


Member participating page:

Fig 4.7.6: Member participating page

CMCS, YTL (2015-16)

38

E-Voting

Member post page:

Fig4.7.7: Member post page


Voting page:

CMCS, YTL (2015-16)

39

E-Voting

Fig4.7.8: Voting page


Voter details page:

Fig4.7.9: Voter details page

CMCS, YTL (2015-16)

40

E-Voting

Unique number for voter:

Fig4.7.10: Unique number for voter


Voter details page:

CMCS, YTL (2015-16)

41

E-Voting

Fig 4.7.11: Voter details page


Registration page:

CMCS, YTL (2015-16)

42

E-Voting

Fig 4.7.12: Registration page


Voter login page:

Fig 4.7.13: Voter login page


Party description page:

CMCS, YTL (2015-16)

43

E-Voting

Fig 4.7.14: Party description page


Member personal details page:

CMCS, YTL (2015-16)

44

E-Voting

Fig 4.7.18: Member personal details page


Parliament vote page:

Fig4.7.19: Parliament vote page


Party selection for vote:

CMCS, YTL (2015-16)

45

E-Voting

Fig 4.7.20: Party selection for vote


Voting for party:

CMCS, YTL (2015-16)

46

E-Voting

Fig 4.7.21: Voting for party


Voter home page:

Fig4.7.22: Voter home page


Result page:

CMCS, YTL (2015-16)

47

E-Voting

Fig4.7.23: Result page

CHAPTER 5
MODULE DESCRIPTION
Voting Form:
There is voting form in the project through which the voter can vote to the
candidate which they want to give but before that voter have to fill various details
about him after fill the information they get unique number by this help of that
unique number voter can give his vote to member that are participating in elections.

Party form:
There another form known as party form in this form there are different party
and very details about party the member that standing in election and the information
like agenda and leader message, party details.

CMCS, YTL (2015-16)

48

E-Voting

Member form:
Member form in this form there is information about member for example like
background, financial background, police background.

Voter details form:


In this form voter have to login and after getting in the project voter can vote
and have to fill details about him/her and very single details about him after fill
information he get unique numberand then he can vote.

Party selections form:


In this form the voter can choose different party and then they can give vote to
different party they have many opinions and can choose the right party and can give
the vote.

Party history page:


In this form all details about the party and history about the party and the
member who are practicing for them and the member which they have giving sit for
different post like MLA/MP.

Result form:
This is the last form. In this form voter get the information that he had vote for
the party successful and there is a thank you page in the end.

CMCS, YTL (2015-16)

49

E-Voting

CHAPTER 6
FUTURE SCOPE & LIMITATION
6.1 Future scope:
Over the years, there have been many issues relating to electronic voting and
electronic voting systems. Various companies and software specialist have tried to

CMCS, YTL (2015-16)

50

E-Voting

develop a system that will address electronic voting issues, but all have been unable to
develop and optimal system, or even anywhere near optimal. Society has not been
able to develop a universal, secure, user friendly and private electronic voting system.
Many electronic systems have been developed, but all have fallen short one way or
another. Often with some segment of society being left out. By continuous research,
Dr. Gilbert and his (Prime III) team have developed a unique system known nowhere
else in the world.
They have developed the Prime III electronic voting system which is
somewhat of an untouchable system compared to others, and it is the only system that
is universal enough to capture votes from all persons in society. The two main voting
procedures that have been used by developers in electronic voting are Mark-Sense
ballots where the user shades in their vote and the other is Direct Recording
Elections (DREs) which allows users to vote via touch (Kohno, Stubblefield &
Rubin). Both have fallen short in being universal, in a sense that mark-sense ballots
can only be used for sighted voters or those with hands, and issues also arise when the
scanner is unable to detect the darkest mark (Kohno, Stubblefield & Rubin). In
reference to the DREs, again the issue arises if the user is blind or does not have any
hands. There are also many other issues with these systems such as security
vulnerabilities. There are other smaller systems, however many have not been
developed enough to be used in general elections.

6.2 Limitations of our project:


To make use of this project one should have basic knowledge of
handling a computer and internet.
If the internet connection fails it can fail the project.

CMCS, YTL (2015-16)

51

E-Voting

CHAPTER 7
CONCLUSION
This ONLINE E-VOTING SYSTEM has been developed successfully and
tested with the sample client connections, from different systems. The benefits of this
system are considerable.
It is observed that the users are able to use the system easily. As all the users
are provided with the information required by them in GUI so the user with minimum
basic knowledge about the computer can be able to operate the system easily.
The users can obtain the required information with ease and accuracy from the
system. Various validation techniques are used to implement for the accuracy of data
for the user. Since the System can be used by authorized user only, a level of security
is provided.

CMCS, YTL (2015-16)

52

E-Voting

CHAPTER 8
BIBLIOGRAPHY & REFERENCE
8.1 Reference:
1. System Analysis & Design By Elias Awad.
2. ASP.NET (VB.NET) complete reference by MacDonald
3. Websites:
www.Planetsourcecode.com

8.2 Bibliography:
Bryan Basham, Kathy Sierra, Bert Bates, Head First Servlets & JSP
o 4th Edition, OReily Publishers, 2004.
Grady Booch, James Rumbaugh, Ivar Jacobson, The UML
o User Guide 1st Edition, Addison Wesley, 1998.
Pankaj Jalote, An integrated Approach to Software
o Engineering 2nd Edition, Narosa Publishing House, 2000.
Roger.S.Pressman, A Practitioners Approach to Software
o Engineering 6th Edition, McGraw-Hill Publishers, 2004.
Herbert Schildt, Java 2:Complete Reference, 5th Edition,
o McGraw-Hill Publishers, 2003.
Java Server Programming (J2EE 1.4) Black Book, Kogent solutions
o Inc. Dreamtech Press, 2007.

CMCS, YTL (2015-16)

53

Potrebbero piacerti anche