We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime. Documentation e-voting Software Engineering. Upcoming SlideShare. Like this document? Why not share! Online voting system by Meghna Dwivedi views.
Embed Size px. Start on. Show related SlideShares at end. WordPress Shortcode. Like Liked. Bilal Mubeen. Software Devloper. Full Name Comment goes here. Are you sure you want to Yes No. Anuj Sawant. Musty Bello , Show More. No Downloads. Views Total views. Actions Shares. No notes for slide. Documentation e-voting Software Engineering 1. My words of special thanks to Sir Adnan Khalid for his guidance and support. Last but not the least we like to thank all the staff at GC University, Lahore for providing us an excellent working environment.
The election process is in need of a standard and secure electronic system that voters can rely on and have trust in. Currently, each state implements its own process for voting; the lack of consistency between polls results in numerous problems.
Various models have been developed to address the issues of security, privacy, validation, and quality control. However, these models do not meet all of the requirements needed for a good system. Exploring electronic voting from a systems perspective can demonstrate the commonalities of the current systems and the possible solutions for the voting process. Voter can vote by entering CNIC. It defines the scope of e-voting, in other words, defines the subject in the context of the election process as a whole, specifies the system requirements Specifies the participating parties of the system and describes their roles.
Specifies the architecture of the e-voting system, the general description of Functionality. Compliant free with election legislation and principles and be at least as secure as regular voting. Microsoft Visual Studio 2. This electronic voting system will enable an eligible voter to vote at any polling site statewide during an election period.
Intended Audience and Reading Suggestions This document is intended for: Development: In order to be sure that our team is developing the right project that fulfills requirements provided in this document. In order to have an exact list of the features and functions that are required to respond according to requirements 6. Our team will get familiar with the idea of the project and suggest other features that would make it even more functional.
Users: in order to know exactly what they have to expect from the system, right inputs and outputs and response in error situations. Project Scope One of the most important and hence core activity of E-Voting system is to give ease to the administration of school.
Administration can save their time. Hence a wide range of data is required to justify the contents of application which should also be updated at regular intervals. Only authorized person admin can access the information. System offers multiple interfaces to enter different type of data. Overall Description Product Perspective E-Voting system will be a desktop software application in order to provide all the required features mentioned in this document. User will enter the username and password at homepage.
Then user can access the desired information. Operating Environment E-Voting system is an desktop application so the following software would be required on server machines 8. Therefore, our team will be limited to use highly mature and robust platform for development and deployment of the application.
Keeping in view the platform independence and robustness of C platform is a strong candidate to be used as a development and deployment platform. The application should provide user with appropriate error messages and should handle run-time exceptions in a controlled manner in order to avoid abnormal termination.
Maintainability Requirements The application should be designed and developed in such a way that it remains highly maintainable and flexible and future enhancements can be easily incorporated. Security Requirements The application should provide protection against unauthorized access.
Feasibility Report: It should provide almost all the facilities what he is required. To serve the above objectives the Solution shall be required that should provide the following set of functionalities. Scope of Admin: Requirements: Technologies: The technology requirements for the projects are short listed here. Hardware: To run this software there should be minimum Pentium 4 system with windows 7.
Time management: This software required minimum 1 month to develop after information and planning phases. Team Members: Each member of the team will work on specific task. One of the team members will get information from stakeholders so that it can develop according to requirements. One of the team members will work on planning, how to develop software and what we need more etc.
Another team member will work on modeling and coding so that well planned project can be implement to fulfill customer needs. After development of the software another team member will test it and deploy. Through this software we can change our world from manual to digital style of saving data. Views Total views. Actions Shares. No notes for slide. I am very grateful to my project supervisor Prof. I alsothank my parents and family at large for their moral and financial support in funding the project toensure successful completion of the project.
Table of ContentsDeclaration Table structure for table registrationdetails Most countries, Kenya not an exception have problems when it comes to voting. Some of theproblems involved include ridging votes during election, insecure or inaccessible pollingstations, inadequate polling materials and also inexperienced personnel. It should be noted that withthis system in place, the users, citizens in this case shall be given ample time during the votingperiod. They shall also be trained on how to vote online before the election time.
In this system people who havecitizenship of Kenya and whose age is above 18 years of age and any sex can give hisher voteonline without going to any physical polling station. There is a database which is maintained bythe Independent Electoral and Boundaries Commission of Kenya IEBC in which all the namesof voters with complete information is stored. Registration is mainly done bythe system administrator for security reasons.
The system Administrator registers the voters on aspecial site of the system visited by him only by simply filling a registration form to registervoter. Citizens seeking registration are expected to contact the system administrator to submittheir details. After the validity of them being citizens of Kenya has been confirmed by the systemadministrator by comparing their details submitted with those in existing databases such as thoseas the Registrar of Persons, the citizen is then registered by the IEBC as a voter.
Thethree largest and most influential ethnic groups in Kenya are the kikuyu, Luhya, and Kalenjins. In Kenya, general elections are carried out every after five years where a head of state thePresident and The National Assembly representatives are elected. They are elected by the people.
The national Assembly has about members representing respective constituencies. In the Local Governments they have the chairman and the Counselor. The counselors are allelected by the people of the state in the respective wards. That is to say, in any given general elections, Kenyans vote for the president, the members of theNational Assembly and the counselors. Most African Electoral bodies IEBC not an exception right from their inception to date, evenwith latest advancements in technology, still use a primitive paper based methods during voting;this system is characterized by manual form filling to chose leaders and transfer of theinformation from manual data capture forms to computerized datasheets, this has led to anexcessive number of mistakes making their way into the final vote counts hence leading toconfusion at the time of announcing the results.
The main advantage of paper-based systems isthat ballot papers are easily human auditable. The disadvantages outweigh the advantages forinstance the need to print ballot papers is a slow, expensive, inflexible, environmentally hostileprocess, visual impairments, or literacy limitations and also last minute changes to the voterregister are difficult to accommodate among others.
Over the last few years, there have been a number of election observers who have suggestedelectoral organizations should introduce electronic voting at State and Local Governmentelection processes. A general observation is that as more business is done using electronicmediums, it should not be difficult to carry out voting using electronic equipment rather thanturning up at the polling place on voting day to use paper and pen.
The phenomenal use of the Internet as a vehicle for improvingcommunication, access to information and electronic commerce has led to the claim that theInternet could be used as either a replacement to attendance voting or as an additional votingoption. For instance, the register that was used for the Multi-Party elections in wasused for the Presidential and Parliamentary elections, the National elections, referendum and Presidential Elections which led to disputation.
The mechanism leading to fraud is manifested in registration places bycorrupt officials on local commissions who are in a position to issue voter registration datacapture forms to illegitimate individuals, stuff ballot boxes, invalidate registration for oppositionvoters or even coerce voters. The Online voting system OVS also known as e-voting is a term encompassing severaldifferent types of voting embracing both electronic means of counting votes.
Electronic votingtechnology can include punched cards, optical scan voting systems and specialized voting kiosks including self contained direct-recording electronic voting systems or DRE. It can also involvetransmission of ballots and votes via telephones, private computer networks, or the internet.
Online voting is an electronic way of choosing leaders via a web driven application. It also minimizes on errors ofvote counting. The individual votes are submitted in a database which can be queried to find outwho of the aspirants for a given post has the highest number of votes.
With system in place also, if high security is applied, cases of false votes shall be reduced. HeShe has to register as a voter first before being authorized to vote. The registrationshould be done prior to the voting date to enable data update in the database. However, not just anybody can vote.
This project done by Mayinje Nandasaba Wilson, a student at Masinde Muliro University ofScience and Technology is geared towards addressing problems encompassing manual votingsystems that have been in place ever since independence. Internet voting systems are appealing for several reasons which include; People are getting moreused to work with computers to do all sorts of things, namely sensitive operations such asshopping and home banking and they allow people to vote far from where they usually live,helping to reduce absenteeism rate.
So many cases ofmissing data in the voter registration files have been reported. Even after voting, malicious clerks and officers-in-charge of a polling station end upplaying with the results figures. This results in the release of wrong results leading to cases ofpost election violence such as the one that happened in early in Kenya.
Require less number of staff during the election. This system is a lot easier to independently moderate the elections and subsequently reinforce its transparency and fairness. Less capital, less effort, and less labor intensive, as the primary cost and effort will focus primarily on creating, managing, and running a secure online portal. Increased number of voters as individual will find it easier and more convenient to vote, especially those abroad.
It shall also enable the voters to vote from any part of theglobe as explained since this is an online application available on the internet. Since thevoting process shall be open as early as possible, the voters shall have ample time to decide whenand whom to vote for. This is also will produce: Less effort and less labor intensive, as the primary cost and focus primary on creating, managing, and running a secure web voting portal.
Increasing number of voters as individuals will find it easier and more convenient to vote, especially those abroad. I also had financial constraints since all the activities involved wereself-sponsored. Its such a truly bad idea that there seems to be no credibleacademic effort to deploy it at all.
The Kenyan General elections of brought nationalattention to problems with current methods of casting and counting votes in public elections. Most people believe that the current system should be changed; there is much disagreement onhow such changes should be made.
Kenyans in the Diaspora have begun signing a petition in a fresh attempt to force the electoralbody to allow them vote online in the next General Election. They advocate using the OVS sinceit reduces cases of uncounted, unmarked, and spoiled ballots and the cost of travelling to citedpolling stations. They are opposed to the use of High Commissions and embassies as pollingstations and embassy officials as returning officers.
The IEBC has in the past recommended thatKenyans abroad vote at the embassies and consulates closest to them. Their report even proposes aframework for a new voting system with a decentralized, modular design. Other researchers have done work in electronic voting; while they may not explicitly mentionvoting from remote poll sites, their work is nonetheless relevant to any effort at designing orimplementing a remote poll site voting system.
Lorrie Cranor acknowledges the problemsinherent in each kind of voting apparatus, but doesnt make an overt recommendation on her sitefor one technology over the rest. Some other academicians like Peter Neumann focus on theimmensity of the problem one faces when trying to design and implement a truly secure votingsystem.
They often remind us of Ken Thompsons Turing acceptance speech and the fact that we 7 A voting machine must produce human-readable hardcopy paper results, which can be verifiedby the voter before the vote is cast, and manually recounted later if necessary. David Chaum presents a very interesting scheme, whereby voters could get receipts for theirvotes.
This receipt would allow them to know if their votes were included in the final tally ornot, and to prove that they voted without revealing any information about how they voted. Thesecurity of this scheme depends on visual cryptography developed by Naor and Shamir, and onvoters randomly choosing one of two pieces of paper.
Mercuri and Neumann advocate the use ofthis technique in electronic voting systems. In the recent years, voting equipments which were widely adopted in many countries may bedivided into five types 1. Paper-based voting: The voter gets a blank ballot and use a pen or a marker to indicate he want to vote for which candidate. Hand-counted ballots is a time and labor consuming process, but it is easy to manufacture paper ballots and the ballots can be retained for verifying, this type is still the most common way to vote.
Lever voting machine: Lever machine is peculiar equipment, and each lever is assigned for a corresponding candidate. The voter pulls the lever to poll for his favorite candidate. This kind of voting machine can count up the ballots 8 Because its interface is not user-friendly enough, giving some training to voters is necessary. Direct recording electronic voting machine: This type, which is abbreviated to DRE, integrates with keyboard; touch screen, or buttons for the voter press to poll.
Some of them lay in voting records and counting the votes is very quickly. But the other DRE without keep voting records are doubted about its accuracy. Punch card: The voter uses metallic hole-punch to punch a hole on the blank ballot. Optical voting machine: After each voter fills a circle correspond to their favorite candidate on the blank ballot, this machine selects the darkest mark on each ballot for the vote then computes the total result. This kind of machine counts up ballots rapidly.
However, if the voter fills over the circle, it will lead to the error result of optical-scan. Recent years, a considerable number of countries has adopted E-voting for their officialelections. These countries include; America, Belgium, Japan and Brazil. The origin of the security issues was due to not only outsider such asvoters and attackers but also insider such as system developers and administrators , even justbecause the inheritance of some objects in the source code are unsuitable.
These errors causedthe voting system to crash.
For , chooses random numbers , computes , , , and , and sends to , where. For , computes and accepts the oblivious signature if and only if. To convert the oblivious signature into a generic signature, lets and computes. The signature for is. As shown in Figure 5 , the verifier accepts the signature as a valid signature if and only if. For a proxy-protected type scheme, the signing phase and verification phase are the same as those in the case of a proxy-unprotected type scheme except for one more computation as shown in Figure 6.
The proxy phase is modified as described subsequently. If it does, accepts the proxy and computes as his or her secret proxy signature key. Based on the proposed signature scheme, our electronic voting system allows a creator central government to delegate one or more proxy creators local government , and a voter can get a legal ballot from a proxy creator and send his or her vote to a verifier center voting computer. This system includes six phases: 1 system setup phase, 2 proxy phase Figure 8 , 3 register phase Figure 9 , 4 circling phase Figure 10 , 5 voting phase Figure 11 , and 6 counting phase Figure 12 , as shown in Figure 7.
The system first generates the required parameters. The proxy creator examines whether the registrant is a legal voter; if so, he or she distributes a certificate to the voter. The voter checks whether he or she has registered successfully via the bulletin.
The voter chooses a candidate and receives the signature on it from the proxy creator. The voting center publishes a message about the ballot from the voter to the bulletin. Every voter can confirm whether his or her ballot has been received by the voting center; if not, he or she can resend the ballot. At the end of the voting period, the proxy creator forwards the decrypting key to the voting canter, and the voting center starts to verify and count the ballots.
The voting center publishes the voting result to the bulletin, where everyone can verify and count all ballots. We assume that the system database already contains an identification list of legal voters and that the bulletin is read-only to all entities except for the authorities. The creator chooses and computes. The proxy creator chooses and computes. Step 5. Step 6. Step 7. Step 8. Step 9. If it does, he or she publishes to the bulletin. A voter picks a pseudoname and a password , computes , encrypts using , and sends it to a proxy creator.
If so, stores in the system database, sets , calculates and , returns to , and publishes to the bulletin, where. If so, he or she has the right to vote. If so, checks whether. If it holds, chooses , calculates , , , and , returns , to , and sets. If so, computes and.
The final signature is. If so, publishes to the bulletin. Every voter can check whether his or her ballot is received by the voting center via the bulletin. If it is not, the voter resends. If so, the signature is valid and the ballot is counted. Everyone can verify and count the ballots via the bulletin. In this section, we analyze our protocol according to the security requirements defined in Section 3.
Because the completeness of the signature depends on the Schnorr signature [ 28 ], we only show the completeness of the oblivious signature generated in the signing phase. For any , we have. Therefore, the completeness of the proxy signature is proved. Unforgeability can be proved via Definitions 3 and 5 and Theorems 4 and 6. Definition 3 DLP. Let be a large prime, be a primitive root modulo , and , where.
If can be evaluated from given , , and , then we say discrete logarithm problem DLP can be solved the probability of solving this problem is denoted as. Theorem 4 unforgeability. In our scheme, assume an adversary tries to evaluate by eavesdropping. Let be a random oracle: input , , and to output i. In Definition 3 , let , , and be input parameters of and obtain output. Let ; then is evaluated. Therefore, , which means the discrete logarithm problem can be solved if exists.
Definition 5 DLP under known plaintext attack. If can be evaluated from given , , , and , , then we say DLP under known plaintext attack can be solved the probability of solving this problem is denoted as. Theorem 6 unforgeability under replay attack. In our scheme, assume an adversary tries to evaluate from eavesdropped and.
Let be a random oracle: input , to output i. In Definition 5 , let , and be input parameters of and obtain output. Therefore, , which means the DLP under known plaintext attack can be solved if exists. In the signing phase, because receives the disguised selection of the message , he or she cannot find out the selection of. Thus, we can conclude that can discover neither the message nor the proxy signature associated with the protocol after the signature is verified.
Owing to the unforgeability of the proxy oblivious signature, cannot repudiate any proxy signature produced by him or her. Therefore, the signature can be verified by all verifiers. Evidently, by using different congruences to check the validity of the original signatures and the proxy signatures, everyone can easily distinguish the proxy signature from a normal signature.
If an attacker takes the place of , needs to obtain b , where , , because we know that, for every of any , there exists such that. Finally, we conclude that the probability of getting the correct is , which achieves theoretical security. In the proxy phase, signs the proxy public key using his or her private key and passes the signature to.
Therefore, cannot deny the fact that he or she has accepted the delegation from. In the register phase, checks whether is a legal voter by his or her id. Therefore, only legal voters can get the certificate CERT R from and participate in the voting event. In the circling phase, checks whether. If it holds, it means that pn has not voted yet; otherwise, the process will be terminated.
Consequently, every legal voter can cast at most one ballot. In the voting phase, encrypts his or her ballot using the symmetric key and sends it to the voting center. Therefore, no one can learn the current voting situation before the voting period is over.
The validity of all ballots can be verified using the examining equation. In the voting phase, every voter can check his or her own ballot via the bulletin, and the ballot cannot be modified by anyone. In the voting phase, encrypts his or her ballot using the key before casting it to , and, therefore, no one can obtain his or her plain ballot. Finally, in the counting phase, because every selected candidate on the bulletin corresponds to a pseudoname , no one can discover which person has made the selection.
This section presents a comparison of our scheme against other related schemes, including blind signature [ 8 ], proxy signature [ 13 ], oblivious signature [ 10 , 11 ], and proxy blind signature [ 19 ]. Tables 1 , 2 , and 3 present the computation cost, communication cost, and ability comparison, respectively. Compared with other related schemes, our scheme provides the most abilities with a low increment in computation cost.
Furthermore, the communication cost is no higher than that of other oblivious signature schemes. In the proxy phase, processes to examine whether holds see asterisk in Table 1. In the signing phase, processes to calculate for. For , may compute by letting and generate for. Consequently, the computation cost is modular multiplication rather than. This section demonstrates an application of an anonymous mobile electronic voting with proxy signer implemented on smartphones.
Figure 13 shows a flowchart of this system. In this system, it is assumed that any signer who is asked for his or her public key responds with his or her real public key immediately and that the requester would receive this public key at once. Tables 4 , 5 , and 6 present the average computation times of each role in each phase, the average communication times of each communication direction in each phase, and the average computation and communication times in each phase, respectively, where PP, RP, CiP, VP, and CoP stand for proxy phase, register phase, circling phase, voting phase, and counting phase.
The steps in this system are as follows. On the main page Figure 14 a , users are allowed to select a role and enter a pseudoname Figure 14 b. An original signer first runs the procedure and waits for proxy signers Figure 14 c. A proxy signer runs Step and selects a detected original signer to request delegation Figure 14 d. The original signer selects the proxy signer on the request list to process the delegation Figure 14 e. After verifying the correctness of the delegation, the proxy signer sets the voting issue Figure 14 f and starts waiting for verifiers Figure 14 g.
A verifier runs Step and waits for a proxy signer to send him a voting event Figure 14 h. The proxy signer selects a verifier to send the voting event Figure 14 i and starts holding the event Figure 14 j. Step After the end of the voting event, the verifier starts verifying the collected votes and displays the voting result Figure 14 o.
We first construct 1-out-of- proxy oblivious signature schemes of proxy-unprotected and proxy-protected types and discuss their security requirements. The proposed schemes combine the advantages of a proxy signature and an oblivious signature and satisfy the security properties of both signatures, including completeness, unforgeability, unlinkability, undeniability, verifiability, distinguishability, and ambiguity. Compared with related schemes, our schemes provide extra proxy ability and perform well in terms of both complexity and usability.
Finally, an anonymous proxy electronic voting application is implemented on smartphones based on the proposed scheme. This article does not contain any studies with human participants or animals performed by any of the authors. This is an open access article distributed under the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Article of the Year Award: Outstanding research contributions of , as selected by our Chief Editors. Read the winning articles. Journal overview. Special Issues. Academic Editor: Georgios Kambourakis. Received 02 Aug Revised 18 Oct Accepted 31 Oct Published 24 Dec Abstract Electronic voting systems can make the voting process much more convenient. Introduction In recent years, network transactions for applications such as Internet auctions and banking have increased greatly.
Motivation Compared with a blind signature scheme, a oblivious signature scheme used in e-voting provides one more property: ambiguity in selected messages. Our Contribution In this paper, based on the Schnorr signature [ 28 ], we propose two novel 1-out-of- blind oblivious and proxy signature schemes that combine the advantages of oblivious signatures and proxy signatures and satisfy the security properties of these two signature schemes. Related Works In this section, we present two representative protocols that are relevant to our scheme: oblivious signature and proxy signature.
Oblivious Signature In , Chaum [ 7 ] introduced a blind signature scheme. Figure 1. Figure 2. Figure 3. Figure 4. Figure 5. Figure 6. Figure 7. Figure 8. Figure 9. Figure Table 1. Table 2. Scheme Blindness Ambiguity Proxy ability Nayak et al. Table 3. Table 4. Table 5. Table 6. References J.
Modic, R. Trapero, A. Taha, J. Luna, M. Stopar, and N. Uzunov, E. Fernandez, and K. Castiglione, F. Palmieri, U. Fiore, A. Castiglione, and A. Li, Z. Liu, J. Li, C. Jia, and K. Shi, N. Zhang, and M. Nayak, B. Majhi, and S. IEEE , pp. View at: Google Scholar L. Tso, T. Okamoto, and E. Mambo, K. Usuda, and E. EA, no. View at: Google Scholar B. Wang and R. Lin and J. View at: Google Scholar A.
Tan, Z. Liu, and C. View at: Google Scholar S. Lal and A. View at: Google Scholar F. Yang and L. Ray and N. Pan, E. Hou, and N. Zwattendorfer, C. Thus, this project will focus on how to design and develop a computer based voting system adopting the direct recording electronic voting to be used by the school during election period. The main purpose of this capstone project is to develop automated voting software that is user-friendly and reliable.
Help Assistant , which contains instructions on how to use the system. The proposed project offers several benefits for the school administration and the student voters which include the following: voters can easily cast their votes, voters can choose their candidates through an electronic screen or computer monitor by a click of a mouse, speeds up the counting of votes, increase the security and reliability of elections, computer can count an unlimited number of ballots, and the system can automatically generate the results to determine the winning candidates.
The main objective of this project is to develop a computer based voting system, Electronic Voting System VOTING SYSTEM for high school and college level, that is accurate, reliable, and easy to use during the election of student representatives and to provide relevant and accurate information needed after the election process.
The study will focus on the development of a computer based voting system for the students of high school and college level. The proposed project will be implemented through the local Intranet connectivity of the school. This is not accessible through the World Wide Web and only the Office of the Dean of students is only authorized person who has the full access of the system after the election period.
This chapter presents the review of the related literature and studies that will enable the researchers to acquire basic information and references in the present study, and the technical background of which will discuss the technicality of the project, details of the technologies to be used and the relevance of the project.
According to Wikipedia. It can include punched cards , optical scan voting systems and specialized voting kiosks including self-contained direct-recording electronic voting systems , or DRE. It can also involve transmission of ballots and votes via telephones, private computer networks , or the Internet. Electronic voting technology can speed the counting of ballots and can facilitate electoral fraud.
According to www. The advantages of an electronic voting system can be divided into advantages for the voters and advantages for the authorities. Advantages of electronic voting for the voters includes: electronic voting speeds up the voting process and increase the security and reliability of elections where electronic vote is transported safely, reliably and fast into the centralized electronic ballot box.
Further, in electronic voting it is not possible to make voting errors by mistake, because the identification information of the chosen candidate will appear on the screen before the vote is confirmed. Another advantage for the voter is that there is no ambiguity in interpreting an electronic vote.
When traditional paper ballots are used, unclear numbers may sometimes cause problems. According to Haupt there exists a paper based system that uses computers to count the actual ballots; however the original paper ballot is still intact.
Direct Recording Electronic DRE voting is a voting machine that does not use a paper ballot like the paper based electronic voting machines. Instead, people choose their candidates and proposals through an electronic screen, either through buttons or through a more modern approach, touch screen.
DRE voting machines also have the advantage of never running out of paper ballots at a polling center, since the computer can count an unlimited number of ballots. The colleges provided the computers for the elections. The voting process started with students presenting their IDs or Form-5s to attending poll clerks, who checked the list of valid voters.
Students on the list then received their passwords from the poll clerks and proceeded to unoccupied voting stations. Using their student numbers and the passwords provided as login information, they opened their electronic ballots and marked the boxes of their chosen candidates. Once they clicked the confirm button, their votes were final and they were automatically logged out.
The system allows voters to log in again but only to check their votes, not change them. The first working prototype of Halalan was created in January and presented to UPD student councils and student publications later that month at the Palma Hall Lobby. The concept and ideas that the researchers have gathered came from various authors and professionals are related to the study which the researchers used to support the study.
The literatures and studies gathered and presented in this chapter gave the researcher insights, facts, and adequate information that will serve as the basis, guide, and reference that are relevant and necessary in the development of VOTING SYSTEM. The lists benefits or advantages of electronic voting system to the voters and administrators are relevant the researchers in the conduct of the present capstone project because these serve as bases in the major concerns of the study, particularly in the features that should be included in the development of the VOTING SYSTEM, and also in the implementation of the system.
The existing voting system is purely manual using paper ballot. The paper ballot is still used in many areas of the country specially colleges and universities for their selection of student leaders. The school does not currently utilize its existing technology that is necessary to speed up the voting process and the tabulation of results. The current technology is adequate enough for implementation of the proposed system. Although it has computer units, local area network connectivity, internet connection, and machine for printing results, the school does not have software or a computer-based voting system.
The use of an electronic voting system and taking advantage of the new technology will make their student services better. The Microsoft Server Enterprise Edition will be used as operating system for the servers running applications such as networking and databases. A software firewall shall be configured in the main server to protect the server and other computers in the network from backdoor applications, Operating system bugs, and Viruses.
The back-end user of the proposed system is the Dean of Students who will stand as the administrator of the computer-based voting system. The admin must register the students in order to access the voting system during election period. The front-end users are the students who will be voting for their candidate. This chapter deals with the method used by the researchers in conducting the study, the system development method used, and its results and discussion.
The researchers will utilize several analytical tools to help and justify the conduct of the study and also guide the researchers to resolve the problems encountered by the school administrators and student voters in the election process. The analytical tools include interview, observation and brainstorming which will be employed by the researchers in analyzing the problems of the existing system.
An interview is a conversation between two people the interviewer and the interviewee where questions are asked by the interviewer to obtain information from the interviewee. The researchers will prepare an interview guide composed of list of questions to help researchers in the interview.
Observing is the study of the expected users. By observing users, an analyst can identify a process flow, awkward steps, pain points and opportunities for improvement. Brainstorming is used in requirements elicitation to get as many ideas as possible from a group of people. Generally used to identify possible solutions to problems, and clarify details of opportunities. Brainstorming casts a wide net, identifying many different possibilities. Prioritization of those possibilities is important to finding the solutions to the problem of the existing system.
Figure 1 illustrates the Modified Waterfall Model that will be used by the researchers in developing the Electronic Voting System. The model develops systematically from one phase to other in a downward fashion, like a waterfall. It is made up of several phases and the details of these phases are:. Requirement Analysis. It also involves developing estimates for the work to be performed, establishing the necessary commitments, and defining the plan to perform the work.
System and Software Design. On this phase, the system will be designed based on the requirements needed in the system. The programmer will create the source codes necessary for the system to be constructed. This phase aimed to find out whether the software functions and features work according to the specification, ensure that the produced system is complete and performs efficiently, evaluate whether the software perform all activities after integration with the existing operating environment, and measure up the reliability and overall quality of the software.
In this phase, the researchers will conduct the system dry-run and conduct training of the target users of the system. The users of the system will check if the recommended functions and suggestions of the users are met. Operation and Maintenance. This Phase is to ensure the information system is fully functional and performs optimally until the system reaches its end of life.
The Operations and Maintenance Phase comprises the following: management of changes to the system to support end users, monitoring of system performance, performance of required security activities such as backups, and continuation of end user support through training and documentation. It has a database that can be updated and maintained by the admin.
The administrator is the only authorized user of the system who can generate results and tally of votes from the system. Voters can choose their candidate and cast their votes automatically by a click of a button. Before the software project is implemented, the researchers will prepare a project schedule that identifies the anticipated activities involved, management of resources and project plans showing the cost needed in the development of the voting system.
Based on the result of the observation and interview as well as users suggestions the researchers created a design for the system to be developed. All the requirements of the first phase are being used to contribute in the successful preparation of creating the Electronic Voting System for high school and college students.
In this methodology, the software evolved as a result of shared information between the respondents and the researchers. Testing will exercise the system in all possible ways. It includes initial testing and final testing of the new software. The electronic voting systems, including equipment and software, should be tested prior to the deployment of to help ensure that the system works as expected. During the Requirements Definition Phase, the researchers together with the beneficiary of the proposed system will work together to establish the architectural boundaries for the project, to establish criteria for measuring the technical performance of the system, and to baseline the requirements.
Activities in this phase are the following: define system requirements, develop system process model, and develop application logical data model, estimate system workload, and Identify strategies for training end users. Software Requirements. The software development tools for this study are presented in Table 1. Visual Basic — Visual Basic is a third-generation event-driven programming language from Microsoft for its Component Object Model COM programming model first released in and declared legacy during Microsoft intended Visual Basic to be relatively easy to learn and use.
It is a member of the Microsoft Office suite of applications, included in the professional and higher editions. Hardware Requirements. Peopleware Recommendation. Table 3. The system is intended for beginners and professional users.
The administrator will attest the bona fide list of students. The registrar now will create members of committee. The members of the committee will be assigned by the registrar to their respective precincts. The registrar will then give them the list of voters. The committee on elections will give the official ballot to the students to vote. After the voting procedure, the members of the committee will now canvass the votes, and will make the list of the winners to be submitted to the registrar and to be noted by the administrator.
The copy of the result of canvassing will be posted on the bulletin board. The figure shown below is the procedural presentation of the current process of College Student Council Voting System. The process starts with the Registrar who will interview the Candidates and the Candidates fill up the candidacy form and will pass it to the registrar, after that the registrar will give the list of voters to the Administrator to attest the bona fide the official voters.
Then the registrar now will create a Committee of Election from the instructors. The Committee on Election now will give the students the official ballot to vote their candidates, after that the Committee on Election now will canvass the votes after the voting process of the students to make the list of winners and will be submitted to the registrar. The Registrar now will submit the list of winners to the Administrator. The Administrator will sign and he will return it to the registrar to post the list of winners to the bulletin board.
The researchers believe that the CSC Election will greatly enhance the speed and efficiency of voting process if CSC Automated Voting System will be developed and implemented in this school. In this system a student is given an identity card number that contains unique Id number and password. Students that are officially registered as voter can only vote.
In addition, this system is designed in such a way that a student is not allowed to vote more than once. Data in this system is completely secured which means only authorized person or the Admin can update the information inside the system. The figure shown below is the procedural presentation of the proposed process of College Student Council Automated Voting System. Three entities are concern in the process: the Admin, the Candidates, and the Voter.
The process started to the Admin who will create lists of voter and candidate. After that the system will display the list of candidates. If yes the vote will be save and the system will save the vote, and if no the system will display again the list of candidates to the voter who wants to change their votes. If the voting process is done the Admin will automatically print the results. To be able to develop and fulfill the proposed system, the researchers will be needing minimum of four personal computers which is run by windows XP or 7 operating system service pack 2 bit.
We also need mysql-connector-odbc In this chapter, the research methodology used to achieve the study will be presented which comprises of the procedures, data collection and tools necessary in developing the proposed system. Methodology is a guiding approach for solving a problem, with specific components such as phases, tasks, methods, techniques and tools.
In the development of the study, the researchers executed the System Development Life Cycle. System development life cycle SDLC is the process of understanding how an information system can support business needs, design and build the system and deliver it to users. It is used in analyzing and planning the system. The System Development Life Cycle has seven stages:.
The researchers also conducted several observation and found out that there are problems in the manual election process in the institution. Therefore, we give the system to the client, expect for a positive feedback and maintain the Online Grading System. Analysis of the requirement : Within this phase, the researchers analyzed the nature of the information and the functions of the software which are required for the system.
The researchers study all the requirements and try to analyze the performance of the system which is to be developed. They also made sure that they get enough information and resources for structuring the suitable system. System Design : In this third stage of SDLC, functional, support and training requirements are translated into preliminary and detailed designs. Decisions are made to address how the system will meet functional requirements.
A preliminary system design, emphasizing the functional features of the system, is produced as a high-level guide. Then a final system design is produced that expands the design by specifying all the technical detail needed to develop the system. System Coding : During the system coding, the researchers will prepare the codes needed for the development of the system.
The occurrence of change is taking place. The Coding procedure will be the hardest part of the system development because it requires a lot of time, effort and patience for the coder because during this procedure, several errors will occur in. System Testing : In the fifth stage, the researchers are done with the coding stage.
Once the system is built testing of the system must take place to ensure workability and brings all the pieces together into a special testing environment, then checks for errors, bugs and interoperability. Any problem that exists will be found and addressed.
In this phase, verification and validation are used. System Implementation : In this sixth stage of SDLC, this will be the period in which the system will be installed and supported in the institution. Now the system is ready for an actual working environment, training is the most important in this phase.
This is the most important step of all and may go on forever. You may visit our facebook page for more information, inquiries and comments. Skip to content. Diagrams Projects. Statement of the Problem This study aims to solve the following problems. Security of the votes of the students as well as the candidates. The counting of votes in CSC election results to time consuming due to volumes of paper.
Miscounts of votes and erroneous counting of result due to the volumes of papers use in manual procedures. Invalid votes are evident that there is problem in the counting procedure of the students. The votes are collected and are then counted, which could take several hours to several days, depending on the volume of votes.
In present generation, people became more literate especially with the use of computers. Technologies emerged to introduce many different ways of advancement. Computer machines are of these. Hence, the proponent has decided to propose a system to improve the existing manual voting system. Redeeming Grace Learning Center has been successfully operated as a private Christian School since It was organize to establish, operate and administer an educational institution.
It also provides security for the voter and the system both internal and external. The external security system may be controlled by the controllers in the voting area while the internal security system operates independently. The proposed system will also make their election hassle free, especially to the teachers or administrator who counts the vote of the students one by one.
Statement of the Problem 1. A manual voting requires an accurate count of votes in able to know the results of the winning candidate after the voting process. The results of manual voting came into question due to several factors regarding human error and miscount of votes.
How to ensure the accuracy in counting of votes in voting system of Redeeming Grace Learning Center in order to be more reliable? Many of the traditional problems faced in manual voting revolve around security issues. Tallying and transmission of result are the root of unintended errors. How to secure the integrity of the votes of the student?
Hence, it is very time consuming. How to lessen the time of gathering of the results without counting manually? Significance of the Study The proposed system will help the Redeeming Grace Learning Center in their voting system and will lead them to the development of their Student Council Organization in conducting an election. The proposed system will help to eliminate frauds and maneuvers in canvassing considering that the computer will be the one to count the votes.
It will also give convenience to those people who will use the proposed system like the students and especially to the facilitators in terms of time consumption, reliability issues and hassles. The researchers will also benefit from their study in improving their skills, knowledge and academic performance in writing a thesis. The proposed study will also benefits and help the future researcher as their guide in conducting a research about voting system of an organization, and how to develop software.
The proponents are also open in development of this study. Objectives of the Study General Objectives: This project was founded and created to replace the existing manual voting system that had produced inconvenience not only to the voters but also to the election facilitators. Our goal was to develop a secure, fast, accurate, user- friendly system for a small scale election.
The Admin has the only rights to access the administration area and authorized to access the transaction such as adding, editing, and deleting of information inside the system. The students will login as voter. Student that officially registered as voter can only vote once. The system would be responsible for counting the votes and has the capability to release required reports regarding the list of voters, candidates and canvassing of results.
Candidate records after the election will be saved and can be manually deleted by the administrator. The researchers used a programming language called Visual Basic 6. The system is designed solely for the student council election of Redeeming Grace Learning Center and could append instantly voters and candidates. It is not applicable in other student council election because the running positions were not the same.
Operational Definition of Terms Administrator - One who administers or manage the voting system. Beneficiary - in the broadest sense is a natural person or other legal entity who receives money or other benefits from a benefactor. Candidate - one that aspires to or is nominated or qualified for running in a certain position. The candidate must be a student from RGLC. Canvass- to examine in detail; specifically : to examine votes officially for authenticity.
Context Diagram level 0 dataflow diagram - A data flow diagram that document the system's boundaries by highlighting its sources and destinations. Data Flow- Data in motion. Data Flow Diagram- A logical model of the flow of data through a system. Database - is the container were the files will be stored.
Entity Relationship Diagram- is an abstract way to describe a database. Nomination - is part of the process of selecting a candidate. Normalization- is the process of organizing the fields and tables of a relational database to minimize redundancy and dependency. Technology - is the scientific method and or materials used to achieve a commercial industrial objective. Visual Basic - is the third-generation event-driven programming language and integrated development environment IDE from Microsoft.
It is known for its COM programming model. VB is also considered a relatively easy to learn and use programming language, because of its graphical development features and BASIC heritage. Voting Area - This area pertains to the form inside the system.
This is the area where the voting process happens. The review focuses on a number of different literatures that is related in the system. It was simple software, because it managed to secure the ballots and performed quick counterbalance.
It was designed to take us through the novice user of the proposed system and it is designed as user friendly environment to know abruptly the command or syntax of the software and user will have not to invest their time and effort to learn it. Inocencio V. If implemented without hitches, it allows for fast, virtually instantaneous tabulation of votes. As a result, lectures become livelier, the presenter can easily stay aware of how well the audience has grasped the ideas he or she has been communicating, and both the presenter and the audience can receive instant feedback from each other.
The e-voting system most widely available at the University of Leeds currently is produced by eInstruction. This system has been developed by SoftworksDev to simplify the process of organizing elections and make it convenient for voters to vote remotely from their home computers while taking into consideration security, anonymity and providing auditioning capabilities.
The voting system presented above provided the proponents the idea of facilities that a voting system can have. They saved on time, effort, paper and whole lot of sweat. This was the first time in India that such a thing was done, and while being modern and user- friendly, it was also eco-friendly as it saved a lot of paper that would have been used up as ballot paper.
It is usually based on some philosophical view. Methodology can regard as a generalized description of the activities of a series of design projects, together with a theory that explains why those projects were successful, and it may be seen as an abstraction from good practice. A methodology is usually presented not as a description but as a prescription, a recommendation that projects should follow the generalized task structure.
It is used to a specific series of steps or a procedure which governs the activities of analysis and design, a procedure used in making systematic observations or otherwise obtaining data or information as part of a study. Research Design Use case diagrams actually describe the usage of the system from the viewpoint of users actors. Use cases can be also viewed as functionality that is accomplished through the interaction between system and actors.
The admin is the person who takes care of conducting the elections by declaring the election details and declaring the results. The admin will login as administrator to access candidate details and student details.