Professional Documents
Culture Documents
Major Report
Major Report
Major Report
Prateek Matharu(CS-1051)
Shashank Singh(CS-1053)
Shri Vaishnav Institute of Technology & Science
Indore
CERTIFICATE
We would like to use this opportunity to thank with gratitude our Head of
Department Dr. Rajeev G. Vishwakarma, Ms. Shweta Pandey and Mr. Zuber
Mirza for this excellent guidance. In addition, we would like to thank Mr. Anand
Rajavat of SVITS for their motivation to take this endeavor and perform.
Here we thank from core, everybody who has helped us at work when it started as
an unknown ocean to swim though, we need more than sense of words. In true
sense, beside our guides we are indebted to our friends at SVITS for their constant
help and invaluable contribution on all occasion when they were most needed.
Again, we find the opportunity to acknowledge our regards and thanks to our
family members who have been true support behind us.
Deepak Agarwal
Prateek Matharu
Rohit Sharma
Shashank Singh
INDEX
1.
INTRODUCTION……………………………………………………………………………………
………………………………8
1.2. Objectives……………………………………………………………………………….
………………………………...9
1.3. Scope…………………………………………………………………………..9
2. SYSTEM ANALYSIS.........................................................................................11
3. FEASIBILITY STUDY……………………………………………………………13
4. LITERATURE SURVEY…………………………………………………………16
4.2. Benefits………………………………………………………………………..17
4.3. Proposed Solution…………………………………………………………….17
5. TECHNICAL PART……………………………………………………………….20
6.1.1. Description……………………………………………………………..24
6.1.2. Advantage……………………………………………………………...25
6.1.3. Disadvantages………………………………………………………….25
6.2.1.1. Glossary……………………………………………………….27
6.3.5. Estimation………………………………………………………………42
6.4. Design…………………………………………………………………………49
6.6. Testing……………………………………………………………….73
1.2 Objective
1.3 Scope
1. INTRODUCTION
1.1Problem Statement
1.2Objectives:-
To solve the problem of low voting and to provide voter more comfort by giving them a suitable
platform because we live in a democracy and voting is one of our fundamental duties as
responsible citizens of the country, but nowhere around the country a 100% people come to vote
during the elections in their territory. There have been many reasons for that some of them are:
1. In the rural areas the influential people keep their men at the polling booths to threaten
the common man to vote for them .
2. There are many portions of the country like the North East where there is locally
sponsored terrorism, at such places the security conditions are also not very bright, so
naturally people feel afraid to come out of their houses and go to vote.
3. Net savvy new generation want hassle free voting system. Also the people in metros
want a system through which they can vote for their territory without traveling.
Keeping in mind these situations and to improve the state of democracy in the country
Online Polling System can be thought as a solution, in conjunction with the ongoing
current manual voting system.
1.3Scope:-
Create different system users and assign different roles with related permissions.
1. Manage all the election related details such as Voter ID Registrations, Candidate Details,
Manage election schedules, Notify general public about other details of all the voter
from one central location.
2. Confirmation of end user identity and will verify which voter are authorized to receive
Voter ID.
3. Maintain history of each candidate and their related information .
4. Activities like notification about verifications to be made, updations , creations done in
the records by the field officer will be maintained .
1.4.Platform Specification :-
1.4.1. Hardware:-
Server Configuration:
SYSTEM ANALYSIS
2. SYSTEM ANALYSIS
2.1. Identification of Need
This project provide solution for low voting problem of country. Since our country have largest
democracy and still our voting rate is near about 50 – 60% and most of them are the person who
are illetrate and give their vote only for money most of the literate person don’t give their vote
because of the hectic procedure of voting which result in low voting of country . To overcome
this problem we have create a project which will give a good platform to voter to vote to their
favourable candidate with an easy way .
2.2 Preliminary Investigation
We investigated a lot before starting this project.We study lot about voting system and the actor
involve in it and their role and also went through number of voting website on the Internet.The
website: “www.indian-elections.com” and “eci.nic.in” impressed us and helped us a lot.
Chapter 3
FEASIBILITY STUDY
3. FEASIBILITY STUDY
After the analysis of the requirement from the proposed system and specification of the
proposed system a feasibility study of the projected system is conducted. The feasibility study is
done to find whether the system is beneficial to user and organization or not. The feasibility
study is carried out to select the best system that meets performance requirements.The feasibility
study includes the investigation of the information needs of the end user and objectives,
constraints, basic resource requirement and cost benefits. The main and prime objective of
feasibility study is not to solve the problem, but to acquire a sense of its scope. Based on this the
feasibility of the proposed system can be evaluated in terms of following major categories:
2. 1 GB RAM or more.
The technical requirements are available to us.Thus, our Project is technically feasible.
4.2 Benefits
4. LITERATURE SURVEY
4.2Benefits
1. The site has a Graphical User Interface which makes it easier to understand for the users
of the system.
2. This site provides live up-to-date data which is personalized for the individual voter.
3. This website will eliminate paper-based administration and manage data electronically.
4. This tool will help voter to analysis their candidate performance based on the provided
data.
5. The data will be collected electronically.
6. This application will provide all the candidate details of the respected area.
7. The final result can be directly viewed by the all voter .
8. Manual computation has been avoided by the use of this application.
9. This website will increase the voting percentage of country .
10. This website will provide a direct chat between the candidate and voter which will help
the voter to know more about their candidate .
Chapter 5
TECHNICAL
5.1 Java Development Kit
5.3 Code
5. Technical Part
The java.lang package provides classes that are fundamental to the design of the java
programming language.
UTIL:
The java.util. * Packages provide support for the event model,collection framework, and date
and time facilities and contain various utility classes.
SQL:
It provides the API for accessing and processing data stored in a data source (usually a relational
database) using the java programming language .This API includes a framework whereby
different drivers can be installed dynamically to access different data sources .Although the
JDBC API is mainly geared to pass SQL statements to a database, it provides for reading and
writing data from any data source with a tabular format.
Chapter 6
SOFTWARE ENGINEERING
APPROACH
Online National Polling is implemented using Incremental Model. The project has been
completed by following through several phases where each phase consists of System
engineering, requirement analysis and design, coding, testing and maintaining the application at
different incremental level.
Nature of software
Application
Tools and Methods used
Deliverables
Although the team size being small, still the product development is made feasible due to
delivery of product in increments and small team working on each increment and rather
than waiting for formation of a bigger team.
Because of the development in increment a deliverable version of product was delivered
on time. Thus, model ensures timeliness of the project.
It combines the iterative nature of prototyping model and linear nature of sequential
model.
Number of people required is less.
Easy to add quality.
The system is designed such that it can be delivered in pieces.
Increments are developed one after the other after the feedback has been received from
the user.
Since each increment is simpler than the original system, it is easier to predict the
resources needed to accomplish the development task within acceptable accuracy bounds.
Disadvantages:
Reusability of code among modules is minimum.
Integration testing is difficult to do.
Incremental Model:
6.1.3. Reasons for use
As this project is based on hierarchical structure, as the project progresses – at each of the level
we have to go through analysis, design, code and test.On the delivery of operational product with
each increment we step to next increment along with our next level in the hierarchy.Incremental
development is particularly useful when staffing is less since we were only 4 project developers
we used this model. Since this model facilitates further improvements therefore in future
increments can be planned to manage technical risks and enhancements.
Requirement Specification:-
Quality function deployment is a quality management technique that translates the needs of the
user into technical requirements for software. QFD emphasizes understanding of what is
valuable to the user and deploying these values through the engineering process.QFD identifies 3
types of requirements:
Normal
Expected
Exciting
Functional Requirement:-
The functional requirements describe the interaction between the system and its environment.
For our project functional requirements may be stated as follows – An HTML Along with JSP
Interface will be implemented to allow the software user to interact with the application and use
all the functionality provided by the system like online examination display of result, Creation
and updating of questions etc. and the information regarding registration or edition of
profile.This system has no hardware interface requirements.The project requires the following
software in order to function properly:
Non-functional requirements
The non-functional requirement describes a restriction on the system that limits our choice for
developing a solution to problem. The non-functional requirements in our project are –
1) Time
The project should be completed within the stipulated time period.
2) Cost
The cost involved in making the project should be feasible. The automated system ought to be
less expensive than the manually handled system.
Physical environment
1) The equipment for the software to be used is a simple web-browser which is located at the the
Election Commission office.
Functionality:-
1. Online registration for the voter id card which will be verified by the field officers (address and
identity validation) and after receiving the field officer's report only the registration will be
validated and a voter id will beissued (a photograph will have to be uploaded).
2. The election commission will be able to use the site to let the candidates register for their
nomination on the site and their officers will validate it.
3. Candidates can run their election campaign through forums and chat-room.
4. A detailed profile of all the candidates constituency wise will be maintained so that voters can
always know about the candidates of their area.
5. Once registered when ever polling is done in any area that areas' people will be able to vote for
their favorite candidates.
6. Devise a mechanism that ensures duplicates voting (online & offline) is not happening.
7. The system would show the current statistics as well on the web site about how many votes
which candidates have got.
8. Later when the voting ends the administrator can add the manual poling results to the database
to calculate the final results which will immediately be flashed on the site.
6.2.1.1 Glossary:-
Users:-
1. Voter : A citizen of India, who is eligible to cast vote.
2. Candidate : A person who is contesting for the elections.
3. Administrator : An Election Commission officer who allots duties to field officers and manages
the contents of the site.
4. Field Officer : The person who verifies the voter and candidate manually and submits the report
to the election commission officer.
5. Political details: Details of candidate such as Name, Party name, phone number etc.
6. Profile: Details of administrator, field officers associated with the election commission.
Terminologies Used:-
SLA: SLA is a formal written argument between two parties, the service provider and the
service recipient. It defines the rules that govern the relationship.
Personal Details: Details of student such as Login id, Name, Contact No., etc.
HTML: Hyper Text Mark-up Language, used to design static web pages.
EJB: Enterprise Java Beans
J2EE: Java 2 Enterprise Edition, used to implement concepts of JSP (Java Server Pages)
and Servlets.
Mysql: A database management tool used to create databases and required tables.
Apache Tomcat: Community Edition of the Websphere Application Server. It provides
support for J2EE and is up to web service standards.
HTTP: Hypertext Transfer Protocol is a transaction oriented web browser-web server
protocol.
RAD: Rational Application Developer, a web project development tool by IBM. It
provides Java Database Connectivity, J2EE support, inbuilt web-server (Websphere) and
a Web development Environment.
Reliability
The main system must be running all the time because any user can access system at any time.
Security
The system must maintain the security by allowing only authenticated users to use it.
Performance
Many parallel entries are done in database at various time by different user, it is mandatory that
system make simultaneous relevant entries and in correct database.
<<extend>>
View differernt info
regarding elections
View Candidate Info <<extend>> Database
view statistics
Administrator
Login
Figure 2
Brief Description
This use case describes how Admin can log into the System. The use case takes user name and password to
logon and checks for its authentication.
Flow of events
NORMAL FLOW:
ALT Flow:
Step Actor Description Condition Location
Precondition
User needs a valid User Name and password to logon to the system.
Post condition
If the use case was successful, the actor is logged into the system.
Actor
Admin/candidate/voter
Special Requirements:
The User Name and password should be provided to the Admin/candidate/voter for login purposes.
Validate candidate
Figure 3
Brief Description
The candidates registering for standing in elections will be required to submit their details which will be
validated by the administrator.
NORMAL FLOW:
1 Admin Clicks the verification tab to verify the Should be logged __________
details in
ALT Flow:
Preconditions
Administrator is already logged in and Candidate has already submitted registration documents.
Post condition
Allot ticket if form is correct. Reject form if details are not properly filled.
Actor
Admin
Special Requirements:
The User Name and password should be provided to the Admin for login purposes.
Manage Schedule
Figure 4
Brief Description
The administrator will update the site for the forthcoming election polls and related information related to
the elections.
NORMAL Flow:
Precondition
Post condition
Special Requirements:
Actor
Admin
Special Requirements:
The User Name and password should be provided to the Admin for login purposes.
Figure 5
Brief Description
The administrator will, after completion of elections and counting, have to add the result to the database to get
the final vote count.
NORMAL Flow:
2 Admin Add polling results to the database Polls have been __________
counted
Precondition
Post condition
Actor
Admin
Special Requirements:
The User Name and password should be provided to the Admin for login purposes.
Generate Reports
Figure 6
Brief Description
The administrator can generate polling as well as candidates reports from the system.
NORMAL Flow:
Precondition
Post condition
Field Officer:
Login
Figure 7
Brief Description
This use case describes how field oficer can log into the System. The use case takes user name and password
to logon and checks for its authentication.
NORMAL FLOW:
2 Field Officer The field officer enters User Name __________ __________
and password
3 Field Officer The system Authenticate the entered Invalid user ALT1
name and password and logs the field ID/password
officer into the system
ALT Flow:
Precondition
User needs a valid User Name and password to logon to the system.
Post condition
If the use case was successful, the actor is logged into the system.
Actor
Field Officer
Special Requirements:
The User Name and password should be provided to the Field Officer for login purposes.
Figure 8
Brief Description
The job of the field officer will be to verify the address of the voters.
NORMAL Flow:
1 Field Officer Clicks the voter list tab to check the Should be logged __________
details of the voters in
Precondition
Postcondition
General User :
Login
Figure 9
Brief Description
This use case describes how general user can log into the System. The use case takes user name and
password to logon and checks for its authentication.
NORMAL FLOW:
2 General User The General User enters User Name __________ __________
and password
3 General User The system Authenticate the entered Invalid user ALT1
name and password and logs the ID/password
General User into the system
ALT Flow:
Precondition
User needs a valid User Name and password to logon to the system.
Post condition
If the use case was successful, the actor is logged into the system.
Actor
Field Officer
Special Requirement
The User Name and password should be provided to the General User for login purposes.
Figure 10
Brief Description
This use case describes how general user can log into the System. The use case takes user name and
password to logon and checks for its authentication.
NORMAL Flow:
1 General User Clicks the tab register for the site __________ __________
3. General User User will submit the form and details Incomplete form ALT
added to the database will be redirected
ALT Flow:
2 General User User correct the form and filled the __________ __________
unfilled entries
Precondition
None.
Post condition
The registratration form will be forwarded to the administration for further clarification.
Actor
General User.
USE CASE: USE CASE: Veiw Statistics
Veiw Statistics
Figure 11
Brief Description
User can view election updates and election schedule and other details.
LT Flow:
2 General User User correct the form and filled the __________ __________
unfilled entries
Precondition
VALIDATION OF CANDIDATES
ADMINISTATOR
- None.
Post condition:-
[correct from]
Allot ticket to
candidate
[ correct information ]
Accept voter id
request
.
3. Name of use case:-Manage election schedule.
Description:-
The administrator will update the site for the forthcoming election polls and related
information related to the elections.
Precondition:-
- Administrator is already logged in.
Normal flow of events:-
Postcondition:-
Manage election
schedule
[update schedule]
[selected schedule]
[delete schrdule]
[new schedule]
Precondition :-
- Administrator is already logged in.
- The manual polls have been counted.
Normal flow of events:-
- Polling result will be added.
Alternate flow of events:-
None .
Postcondition :-
<<extends>>
ViewProfile
Field Officer
Update Profile
Verify Details
Description :- The field officer will be able to view the information aboutthe verifications to
be made in the area allotted to him.
Precondition :-
New registrations in
his area can be viewed
as k for
conform ation
[ No ]
[ Yes ]
Update profile
Return to
profilre page
3. Name of the case:-Verify Details.
Description:-
The field officer after verification of details of voter id registrations will submit whether
the information presented is correct or not.
Precondition:- Filed officer should been logged in.
Normal flow of condition:-Will be able to submit verification details.
Alternate flow of condition:-None.
Post condition:-Result will be sent to administrator.
Profile
Candidate
Update profile
Forum
User Profile
can be viewed
[ No ]
[ Yes ]
Update profile
Return to
profilre page
<<Extends>>
Update profile
Cast vote
Submit complaint
Post conditions:
exit
Grant online
voting ID
Post conditions:
as k for
conform ation
[ No ]
[ Yes ]
Update profile
Return to
profilre page
Name of use case: Cast Vote
Description:The user after registering for online voting system will be able to cast their
votes whenever elections will be conducted in their areas.
Pre condition:
- The user is logged in as voter.
- The user has registered for online voting.
- The voter can vote for the selected candidate from the list of available candidates.
Post condition:
Provide list of
candidates
register
users vote
update user
status and results
Name of Use Case : Submit Complaints
Description:
The users will be able to submit complaints regarding the delay in verification by field
officers and any other matter.
Preconditions:
- The user is logged in as voter.
- The user will submit any complaints regarding his/her ID or any other problems.
Post conditions:
Submit complaint
to field officer
Update field
officers table
<<Extends>>
<<Include>>
Voter ID Registration
<<Extends>>
View Area Details
Register View
User
<<Include>>
Candidate Registration
Description: User can register through this either for a voter ID card or for standing in the
election as a Candidate.
Precondition:None
Post conditions:
The registratration form will be forwarded to the administration for further clarification.
The user wil as k for
regis tration form
Voter Id Candidate
Complete
Com plete
Description: User can view election updates and election schedule and other details.
Normal Flow of events: Users will be able to view area details, candidate details and
other details.
Area info
Candidate info
The objectives of software project planning are to provide a framework that enables a teller and
other users of product to make reasonable estimates of resources, cost and schedule. This
reasonable estimates. Software project management begins with a set of activities that are
The first step in planning a project is to define the scope of the project and the resources
available for its development. This should be followed by the details of the project team
The scope of ONLINE NATIONAL POLLING is very wide. The project would provide high
performance over low cost. Various tasks could be completed in lesser time. Web based services
Reusable Software
person Component
Human Resources:-
It refers to the persons who were actually involved in analysis, design, planning of the software
system. This is the most important resource required for the development of the software. For
our project the human resource includes the internal project guides, Ms. Shweta Tiwari, Mr.
Deepak Agarwal
Prateek Matharu
Rohit Sharma
Shashank Singh
Environmental Resources :-
Environmental resources consist of hardware and software resources and indicate the hardware
and software that will be used for the development of the system.
Hardware Resources :-
Server Requirements:-
Client Requirements:-
Software Resources :-
Server Requirements :-
Database Mysql
Client Requirements
Apache tomcat
6.3.3 Team Organization:-
The best team structure depends on the management style of the organization, the number of
people who will populate the team and their skill levels, and the overall problem complexity. In
Democratic Decentralized: This software engineering team has no permanent leader rather task
coordinator for short duration of time and then replaced by other who may coordinate other task.
Decisions on problems and approach are made by group consensus. Communication among team
members is horizontal.
A B
D C
DEMOCRATIC DECENTRALIZED TEAM STRUCTURE:-
GUIDES:-
DEMOCRATIC DECENTRALIZED TEAM STRUCTURE
MS SHWETA TIWARI
MR.ZUBER MIRZA
DEVLOPER:-
DEEPAK AGARWAL
DEVLOPER:-
DEVLOPER:-
SHASHANK SINGH
PRATEEK MATHARU
ANALSIS AND DESIGN
CODING AND DATABASE
We are giving the detailed schedule of my project in terms of the deliverables, phases, the
activities, steps and milestone in the project.
Deliverables:-
Deliverables are the items that the customer expects to see during the project development. For
our project, the following are the deliverables:
MODULE 2
INFO PROCESS SCOPE DESIGINING
GATHERING MODEL 2
MODULE 3
FUN PROJECT DESIGINING
SPECIFICATION RESOURCE MODEL 3 TESTING OF ALL
MODULE
REQ PROJECT VERIFICATION
ELICITATION SCHEDULE
AND ANALYSIS
6.3.5 Estimation:-
Cost Estimation:
Cost estimation is part of the planning phase of any engineering activity. The cost of software
can be calculated based on the following factors:
Size
Complexity
Level of Reliability
Level of Technology Utilized
Availability, Feasibility & Stability of the system used to produce the product.
During the planning stage, one needs to decide how many engineers are needed for the
project and develop a schedule.
In monitoring the project’s progress, one needs to assess whether the project is
progressing according to schedule and take corrective action if necessary.
6.3.5.1 COCOMO Model:
For estimating the cost of our project, we have used the COCOMO model. Constructive cost
model (COCOMO model). It is a hierarchy of software estimation model. It uses empirically
derived formulas to predict efforts as a function of LOC estimated. It consists of three different
models of increasing complexity and levels of detail. A brief description of the three models is
presented below:
In this model, the cost is estimated solely on the basis of the delivered source
E = a0* (KLOC)b0
Where,
E = Effort
Expressed in thousands
The cost is estimated on the basis of two parameters – the delivered source instructions or lines
of code measured in thousands (KLOC), and an associated formula for determining the nominal
development effort, known as the Effort Adjustment Factor (EAF).
E = a0 *(KLOC)b0 * EAF
Where,
E = Effort
D = (2.5) * E0.35
This equation helps in verifying whether the project category chosen is correct or not.For the
COCOMO model, the equation for calculating the number of persons involved in the
development process is:
N=E/D
Where
E = Effort involved
D= Duration
The advanced COCOMO model uses the same formula as the Intermediate COCOMO model,
but the equation is applied separately for each of the following phases:
Analysis Phase
Design Phases
Maintenance Phase
Testing Phase
MODE :-
For our project, we have used the Intermediate COCOMO Model for cost estimation.The project
lies in the category of semidetached mode for the COCOMO model. The various variables
needed for the calculation are listed below for the project.
Cost/Benefit Analysis:
Intangible Cost: The intangible cost related to our project comprises of the labor put in,
study hours devoted, in making the project and the advice given to us by our guide in
making this project. The intangible benefits involved in our project are the satisfaction of
our guide and colleagues who will test and use our project.
Indirect Cost: The indirect expenses related to our project are: electricity
consumed depreciation of the computer systems and other equipment that are used in the
development of the project. It also includes the cost of gathering the information
regarding the project and the cost of the books that were bought in concern with the
project.
Variable Cost: Variable cost includes the cost of the stationary used for project report
and also the cost of the auxiliary storage media required as a backup of our project.
Variable cost also includes the traveling expense that was done for the project.
A risk is any unfavorable event or circumstances that can occur while a project is underway. If a
risk becomes true, it can hamper the successful and timely completion of a project. Therefore, it
is necessary to anticipate and identify different risks that a project is susceptible to, so that a
contingency plan may be prepared in advance to contain the effects of each risk. Risk
management aims at dealing with all kinds of risks that might affect a project. We quantify the
level of uncertainty and the degree of loss associated with each risk, when we analyze the
different categories of risks that are considered.
Uncertainty: The risk may or may not happen; that is, there are no 100% probable risks.
Loss: If the risk becomes reality, unwanted consequences or losses will occur.When risks
are analyzed, it is important to quantify the level of uncertainty and the degree of loss
associated with each risk. To accomplish this different categories of risk are considered.
Types of Risks:-
PROJECT RISK
TECHNICAL RISK
BUSINESS RISK
KNOWN RISK
PREDICTABLE RISK
UNPREDICTABLE RISK
Risk Prioritization:-
Based on the impact of the individual risks, we can prioritize them in the order of their removal
as follows:
Why does software need a security policy and plan? What’s the point of having them?A security
policy, included within a security plan, helps to ensure that everyone is in the sync with the
software’s needs and requirements. With a firm policy in place. Every employee knows what is
expected—what the rules are – and how the requirements are to be implemented. The limits are
clearly defined and consistent guidance is provided for everyone. Statements within a security
plan can help to ensure that each employee knows the boundaries and what the penalties of
overstepping those boundaries will be.
We are using Java in which modular mechanism can be implemented easily and modular
mechanism is very helpful for the future enhancements. So if any further enhancements being
happen than with the slightly change in the related module the new functions can be
implemented easily. Any changes occur in the system is acceptable, our system is not limited to
certain functionality only.
Each and every models (MODULE) contains the object which can be easily identify by there
name and the type of object. The whole description of the object is given in very clear and
precise way.
6.4 Design:-
6.4.1. Design Constraints:-
Software design is an iterative process through which requirements are translated into a
“blueprint” for constructing the software. Initially the blueprint depicts a holistic view.Here
design is at a high level of abstraction – a level that can be directly traced to specific system
objective and more detailed data, functional and behavioral requirements. As design iteration
occur, subsequent refinement leads to design representation at much lower levels of abstraction.
Design Concepts:-
Design concepts provide the software designer with a foundation from which more sophisticated
design methods can be applied.
3.Modularity: It is a design concept in which software is divided into separately named and
addressable components, often called modules that are integrated to satisfy problem
requirements.
4.Software Architecture: It alludes to ‘the overall structure of the software and the ways in
which the structure provides conceptual integrity for a system ‘.It is the hierarchical structure of
modules, the manner in which those components interact and the structure of data that are used
by the components.
5.Control Hierarchy: Also known as the program structure, the control hierarchy represents the
organization of the program components and implies a hierarchy of control.
9. Information Hiding: The principle pf information hiding states that modules should be
specified and designed so that information contained within a module is inaccessible to other
modules that have no need for each information.
Diversification
Convergence
In the use of pre written library modules, in particular reuse of modules in our project we have
used hybrid design approach, starting from an abstract design and identifying the major modules
of the online shopping system and decomposing them in to their lower level modules. At low
levels where there are more number of modules, the acceptance of reusability of modules and
common sub modules come in to picture.
6.4.3. Modeling :-
6.4.3.1 DETAILED CLASS DIAGRAM:-
6.4.3.2 INTERACTION DIAGRAM:-
1)ADMIN LOGIN:-
2)APPLY FOR VOTER ID:-
3) CANDIDATE LOGIN:-
1: grade faculty :Boundar
3: feedback form(complete) y
6: updation msg
4: check and validate form
:Databas
5: update database
e
:Controll
er
4)CAST VOTE:-
5)FIELD OFFICER LOGIN:-
6) GENERATE REPORT:-
7) REGISTER FOR SITE:-
8)REGISTER FOR ONLINE VOTE:-
9)VALIDATE CANDIDATE:-
10)VIEW RESULT:-
11)VIEW STATISTICS:-
12)VIEW VERIFICATION LIST:-
13)VOTER LOGIN:-
6.4.3.3 STATE DIAGRAM:-
LOGIN UNSUCESSFULL
RELEVAN TASK
T TASK PERFORMED
6.4.3.5 OBJECT DIAGRAM:-
Officers
RAJ
General User home
RAJAT Database
techno
12000
voters list
user list
officer list
ARVIND
Field Officer
YASH
Candidate Prithvi
22, Navi Mumbai
Kumund
9876543210 Administator
Kirorimal
456001
3, janvihar colony, Mumbai RAGAV
3
Voter 965487136 PREMDAS
Janmorcha 32, Swami Vivekanand
CHETAN
political background 9988776655
BRIJESH
jankshetra Senior Officer
3-A, Vasant Kunj
10
011-45698798
photo
Officer database
reports
schedule
candidate list
vote details
verification list
6.4.3.6DEPLOYMENTDIAGRAM:-
We have used java language for our project. General facilities which encourage to use java are:
affine transformation.
We have chosen JAVA as the language for implementing the project The primary motivation for
the use of java in our project is its platform independent features. JAVA with various extra
features clubbed with features of c++ makes it the more suitable language for networking which
is the basic requirement of our project. The various features of java are summarized below
Simple Security Portability Object-Oriented Robust Multithreaded.
6.6 Testing:-
Software testing is a critical element of software quality assurance and the ultimate review of
specification, design and code generation .Testing of the software leads to uncovering of errors
in the software and reveal that whether software functional and performance requirement are
met. Testing also provides a good indication of software reliability as software quality as a
whole. The result of different phases are evaluated and then compared with the expected results.
If the errors are uncovered they are debugged and corrected. A strategy approach to software
testing has the generic characteristics:
Testing begins at the module level and works outwards towards the integration of the
entire computer based system
Different testing technique are appropriate at different point of time.
Testing and debugging are different activities, but debugging must be accommodating in
the testing strategy.
A strategy for the software testing must be accommodate low level tests that are necessary to
verify that a small source code segment is performing correctly according to the customers
requirement and that of developers expectations .
Software testing is a critical element of software quality assurance and represents the ultimate of
specification, design and code generation. Once source code has been generated, software must
be tested to uncover and correct as many errors as possible before delivery to the customer. Our
goal is to design a series of test cases that have a high likelihood of finding errors.
That’s where techniques come into the picture. These techniques provide systematic guidance for
designing tests that
2. Exercise the input and output domains of the program to uncover in program
Testing of software leads to the uncovering of errors in the software functional and performance
requirements are met. Testing also provides a good indication of software reliability as software
quality as a whole. The result of the different phases of testing are evaluated and then compared
with the expected results. If the errors are uncovered they are debugged and corrected.
1. Testing begins at the module level and works “outward” towards the integration of the entire
computer based system.
3. Testing and Debugging are different activities, but debugging must be accommodated in
testing strategy.
A strategy for the software testing must accommodated low level tests that are necessary to
verify that a small source code segment is performing correctly according to customer’s
requirements and that of developer’s expectations.
Testing Principles:
6.6.2. Testing Methods & Strategies used along with Test Analysis for Use Cases:-
White box testing sometimes called as glass-box testing, is a test case design method that uses
the control structure of the procedural design to derive test cases. Using white box testing
methods, the software engineer can derive test cases that guarantee that
1. All independent paths within a single module have been exercised at least once.
3. Execute all the loops at their boundaries and within their operational bounds
White box testing should not be dismissed as impractical. A limited number of important logical
paths can be selected and exercised. Important data structures can be probed for validity.
Flow Graph
4 5 6 7
177
Determination of Cyclomatic complexity of the resultant flow graph:
input conditions that will fully exercise all of the functional requirements for a
program. This testing helps in finding the errors for the following categories:
2. Interface errors.
4. Performance errors.
5. Initialization errors.
Chapter 7
CONCLUSION AND
DISCUSSION
2. The voter, if by some reason gets disconnected from the internet connection
then he will have to re-register so that he can continue with navigation in site.
3.The voter must remember all the information that he/she provide during
registration because during voting a bundle of question will be put in front of
him/her so that it will proof its identity.
During the development of the project there were certain obstacles which we faced.
Chapter 8
BIBLIOGRAPHY AND
REFERENCE
2. UML Bible.
1. www.homepages.uel.ac.uk/D.Bowden/
2. www.agilemodelling.com
3. www.google.com
4. www.indian-elections.com
5. www.eci.nic.in