Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 75

MAHARASHTRA STATE BOARD OF

TECHNICAL EDUCATION (MUMBAI)


A
PROJECT REPORT
ON

“VOTING SYSTEM ’’
SUBMITTED BY
KOMAL GANGURDE
SAKSHI AHIRE
DIVYA GADEKAR
SAKSHI JAIN

UNDER THE GUIDANCE OF

Prof. N. D. Dhamale

DEPARTMENT OF INFORMATION TECHNOLOGY


SANDIP POLYTECHNIC, NASHIK
(2022-2023)
SANDIP FOUNDATION’S
SANDIP POLYTECHNIC, NASHIK
A/P: Mahiravani – 422213, Tal &Dist: Nashik
Website: http://www.sandipfoundation.org
E-mail: principal@sandippolytechnic.orgTel: (02594) 22571/72/73

Certificate
This is to certify that the project report entitled“VOTING SYSTEM” has
been successfully completed by:

A. Komal Gangurde
B. SakshiAhire
C. DivyaGadekar
D. Sakshi Jain

as partial fulfilment of Diploma course in Information Technology under


the Maharashtra State Board of Technical Education, Mumbai during
the academic year 2022-2023.
The said work has been assessed by us and we are satisfied that the
same is up to the standard envisaged for the level of the course. And that
the said work may be presented to the external examiner.

Prof. Prof. V. B. Ohol


PROJECT GUIDE HOD

(Name & Sign of External Examiner) Prof. P.M. Dharmadhikari


PRINCIPAL
ACKNOWLEDGEMENT

With deep sense of gratitude we would like to thanks all the people who have lit
our path with their kind guidance. We are very grateful to these intellectuals who did
their best to help during our project work.
It is our proud privilege to express deep sense of gratitude to, Prof. P.M.
Dharmadhikari, Principal of Sandip Polytechnic, Nashik, for his comments and kind
permission tocomplete this project. We remain indebted to Prof. V. B. Ohol, H.O.D
Information Technology Department for their timely suggestion and valuable
guidance.
The special gratitude goes my guide Prof. ......... and staff members, technical
staff members of Information Technology Department for their expensive, excellent and
precious guidance in completion of this work. We thank to all the colleagues for their
appreciable help for our working project.
With various industry owners or lab technicians to help, it has been our
endeavour to throughout our work to cover the entire project work.
We are also thankful to our parents who providing their wishful support for our
project completion successfully.
And lastly we thanks to our all friends and the people who are directly or
indirectly related to our project work.

KOMAL GANGURDE
SAKSHI AHIRE
DIVYA GADEKAR
SAKSHI JAIN
INDEX

Page
Chapter No. Particular
No.
Abstract 1
1 Preamble 2
1.1 Introduction 2
1.2 Review of Literature 2
1.3 Problem Statement 5

1.5 Proposed System 6


1.5.1 Feasibility Study 6

2 System Architecture 8
2.1 Methodology 8
2.2 Modules 10

3 Software Requirement Specification 11


3.1 Requirements of System 11
3.1.1 Hardware Requirement 11
3.1.2 Software Requirement 11
3.2 Data Requirement 11
3.3 Functional Requirement 11
3.4 External Requirement 11

4 System Modelling 12
4.1 Dataflow Diagrams 12
4.2 UML Diagram 13

5 Implementation Details 17
5.1 Implementation 17
5.1.2 Platform Used 17
5.2 Modules and Language Used 20
5.3 Cost 20
6 Coding 21

7 Testing 27
7.1 Unit Testing 27
7.2 System / Integration Testing 27
7.3 Test Cases and Results 28

8 Conclusion 31

8.1 Advantages 32
9 Future Scope 33
10 References 34
11 Appendix A 37
FIGURE INDEX

Page
Figure No. Particular
No.
2.1 Waterfall Model of Software Development 8
4.1.1 Data Flow Diagram - Level 0 12
4.1.2 Data Flow Diagram - Level 1 12
4.2.1 Structural Diagram for Voting system 13

4.2.2 Component Diagram for Voting system 14

4.2.3 Use Case Diagram for Voting system 15

4.2.4 Activity Diagram for Voting system 16

TABLE INDEX

Page
Table No. Particular
No.
7.3.1 Test Case for Admin 28
7.3.2 Test Case for Adding voter 28
7.3.3 Test Case for Adding candidate 29
7.3.4 Test Case for Adding booth 29

7.3.5 Test Case for Adding ward 30


7.3.6 Test Case for Adding Button 30
Voting system

Abstract

The planned online legal system with biometric identification is Associate


in Nursing electronic legal system that seeks to create use of the
individuality of the trivia of the human fingerprint to more enhance the
amount of trust and confidentiality of the voters within the system yet as
creating the particular method as universally accessible as doable which
might be achieved through the preparation on the net. It’s expected to
unravel the 2 crucial problems facing workers elections conducted
among the University of City Community that is the project case study.
For the elector registration and authentication processes that are
performed on the desktop module, the elector is anticipated to possess his
or her fingerprints captured and therefore the trivia extracted that's hold
on the information. This can be done to forestall the prevalence of
multiple registrations or identity. Thus, throughout the authentication
amount, electors are expected to bear an identical verification of their
fingerprint samples against the values hold on within the information that
is known through the employment of distinctive a singular novel elector
positive identification allotted throughout registration The project was
able to win a high success rate within the use for conducting elections
because it was able to stamp multiple registrations by voters through the
combined use of each the distinctive voter positive identification and their
unique fingerprints. This effectively resolved all queries that will arise on
eligibility of voters and certification hiccups.

Keywords— biometric, confidentiality, distinctive, elector, hiccups.

Department of Information Technology, Sandip Polytechnic, Page


Voting system

CHAPTER NO:1
PREAMBLE

Department of Information Technology, Sandip Polytechnic, Page


Voting system

1.1 INTRODUCTION

Department of Information Technology, Sandip Polytechnic, Page


Voting system

The token is shipped by the administrator to every citizen through his or her

Department of Information Technology, Sandip Polytechnic, Page


Voting system

associated email. Worthy to notice is that although balloting is currently done

Department of Information Technology, Sandip Polytechnic, Page


Voting system

ubiquitously, it should administrated throughout the stipulated amount as contained

Department of Information Technology, Sandip Polytechnic, Page


Voting system

within the email message sent to the voters. Once and for all, the University of

Department of Information Technology, Sandip Polytechnic, Page


Voting system

Metropolis On-line Legal System with identity verification project, has been ready to

Department of Information Technology, Sandip Polytechnic, Page


Voting system

deliver AN electronic legal system that solves all the highlighted challenges of the

Department of Information Technology, Sandip Polytechnic, Page


Voting system

standard system of conducting workers elections inside the University of metropolis,

Department of Information Technology, Sandip Polytechnic, Page


Voting system

giving voters a sure and credible suggests that of physical exercise their franchise

Department of Information Technology, Sandip Polytechnic, Page


Voting system

with nice ease. It’s thus counselled to be deployed totally in resulting workers

Department of Information Technology, Sandip Polytechnic, Page


Voting system

elections.

Department of Information Technology, Sandip Polytechnic, Page


Voting system

1.2 REVIEW OF LITERATURE

Department of Information Technology, Sandip Polytechnic, Page


Voting system

We have gone through some voting systems the overview of them are as bellows:

1. An Efficient Online Voting System

Department of Information Technology, Sandip Polytechnic, Page


Voting system

This paper deals with design, build and test an online voting system that

facilitates user (the person who is eligible for voting), candidate (Candidate

Department of Information Technology, Sandip Polytechnic, Page


Voting system

are the users who are going to stand in elections for their respective party),

Election Commission Officer (Election Commission Officer who will verify

Department of Information Technology, Sandip Polytechnic, Page


Voting system

whether registered user and candidates are authentic or not) to participate in

online voting. This online voting system is highly secured, and its design is

very simple, ease of use and also reliable. The proposed software is developed

Department of Information Technology, Sandip Polytechnic, Page


Voting system

and tested to work on Ethernet and allows online voting. It also creates and

manages voting and an election detail as all the users must login by user name

and password and click on his favorable candidates to register vote. This will

increase the voting percentage in India. By applying high security it will

reduce false votes.

Department of Information Technology, Sandip Polytechnic, Page


Voting system

2. Review on Aadhaar Based Voting System using Biometric Scanner


This paper describes overview of various research done to improve the
security, privacy of the e-voting technology. To make such kind of system,
every system consists of voter authentication and vote casting. Now days
using of biometric based security level system become faster and secure. In
India, government is collecting bio metric information of every person and
providing them a unique twelve-digit number called Aadhaar Number. Hence,
using of Aadhaar number and its biometric database voter verification can be
made, after verification voting can be perform.

3. A Survey on Smart E-Voting System Based On Fingerprint Recognition


A smart electronic voting system (EVS) is a voting system in which the
election data is recorded, stored and processed totally as digital information.
By using a voting application and biometric scanner. Authentication of voters,
security of voting process, to secure voted data is the main goal of smart e-
voting system. In many proposals, the security of the system relies mainly on
the ballot box voting system. But security of data, privacy of the voters and
the accuracy of the vote and increase voting percentage are also main aspects
that have to be taken into consideration while building smart e-voting system.
Main goal is the authentication of voters and polling data security aspects for
smart e-voting systems is discussed. It ensures that vote casting cannot be
altered by unauthorized person. The voter authentication in online process can
be done by UIDAI data connectivity and registration through administrators
and by fingerprint recognition. In online voting system finger vein sensing
which enables and check appropriate voter and after it allow voter to cast
him/her vote. Also the voted data and voters details can be sent to the nearby
Database Administration unit in a timely manner using Internet to centralized
databases. Donating a vote and counting votes with security and accuracy
both are perform on electrical machine (computer) means constitutes Smart
Electronic Voting System. Developing an smart E-voting system needed the
use of robust voting mechanism that is relatively huge challenge for online

Department of Information Technology, Sandip Polytechnic, Page


Voting system

data processing with lot of security to design. This is present a concept of


smart voting system which ensures authentication of voter, authorization of
user and counting the result. Approach collects information from UIDAI and
uses this information to validate voter. Also the main thing is that the distance
not matter in smart evoting system. The voters are donating their vote from
any voting booth or place to their registered voting area. This approach is
increasing the voting percentage. And helping for completely stop the fake
voting with smart security.

4. A Literature Survey On Micro-Controller Based Smart Electronic Voting


Machine System
A voting system provides rules and regulations to ensure valid selection of
leader by people. This survey describes a new scheme called Smart Electronic
Voting Machine based on PIC Micro controller. The working process of this
machine is easy to understand and easy to operate and it should be consistent
and error free as compared to manual voting system where the manual design
is slower, poses full day tiredness on people and chances of errors are greater.
In microcontrollersystem voter polls a vote very easily by pressing a poll
button and final results are displayed in zero time by just pressing a result
button.

5. A Survey on Secured E-Voting System Using Biometric


Biometrics is the technique of using rival, non transferable, physical
characteristics, such as fingerprints, to earn entry for personal identification.
Since After the invention of the rival technology it has been being used in
security systems and authentication. Presently, security fields have three
different types of authentication, they are: Something we know: a password,
PIN, or piece of personal information something we have:
a card key, smart card, or token and something we are: a Biometric based
computer networks and its access in the internet are the techniques which are
known little and very rarely implemented. This paper deals with the
accessibility of biometrics in a practical application like polling of votes-„e-

Department of Information Technology, Sandip Polytechnic, Page


Voting system

voting‟ using a physical entity (finger print, Voice Recognition) through


computer network.

1.2 PROBLEM STATEMENT

In any instance of an election involving the academic staff of the University of


Ibadan, it has been observed that there are primarily two major issues that are usually
sources of problems to the voting population. Firstly, it is usually commonplace that
dispute over the issue of Eligibility or otherwise of the staff voters arises a lot. This is
partly due to the varying staff levels on the academic ladder and also due to the time
difference between dates of promotion to the next level. Secondly, there are always
incidences of staff voters been required to wait on long queues during election period
thus leading to a situation where they are tired before they get the chance 3 to cast
their vote and also due to the presence of the queue, aspirants and their campaign
teams often exploit the situation to coerce voters into voting for them since all parties
in the election are physically present. The above factors combined to create a situation
whereby any staff election is deemed not credible, and fair. Thus, there exists a
vacuum for a system with features that would curb the inefficiencies of the current
system

Department of Information Technology, Sandip Polytechnic, Page


Voting

1.5 PROPOSED SYSTEM

The project voting system with biometric authentication is an electronic voting system
which seeks to make use of the uniqueness of the minutiae of the human finger print
to future enhance the level of trust and confidentiality of the voters in the system as
well as making the actual process as universally accessible as possible which would
be achieved through the deployment on the internet.
The aims to make this project is to develop an application that seeks to use various
stages of security authentication to enhance the electioneering process for staff
elections using the case study that is the university of IBADAN, ultimately providing
an online platform which enables voters to exercise their franchise from any location
during the election period.
The following points are implemented in proposed system:-
A. The voter registration an authentication process which are perform on the desktop
module the voter is expected to have his/her fingerprint captured and the minute
extracted that is stored on the database.
B. In this system we have created a secure online voting platform where authenticity
of votes and voters are ensured with the use of mechanisms such as fingerprints
registrations.
C. We also improve voter’s identification since biometric features cannot be shared.
D. We also avoid the problems of queuing during voting period on elections.
E. This system is become a spoofing proof encapsulation is adorned.

1.5.1 Feasibility Study:

1. Technical Feasibility:

This project is feasible with respect to technology. In this project, required


resources are quite easily available. Hardware we bought from online store and the
Software Development Kit is available on various websites.
In this system the voter does not need to go to his registered ward so it can be
easy for him/her. By using fingerprint he/she can open information about their ward
from nearest booth.

Department of Information Technology, Sandip Polytechnic, Page


Voting
2. Financial Feasibility:

The Project needs open source software’s and some hardware part like
fingerprint sensor which is easily available. Also, it is available at moderate cost and
can be purchased easily.

3. Time Feasibility:

The time given to actual development will be divided in web development,


backend server. For demonstration purpose it is required to user login to the system.
The requirements and work to be done is understood by all the team members
and the work is shared amongst the four team members. Also, we helped each other
using remote access to pc and without physically being there. So, the work was well
planned and that’s why it completed in given time period.

4. Operational Feasibility:

For the operation needs id and password for admin and voter needs to enrol
fingerprint.

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO: 2
SYSTEM ARCHITECTURE

Department of Information Technology, Sandip Polytechnic, Page


Voting

Department of Information Technology, Sandip Polytechnic, Page


Voting

2.1 METHODOLOGY

Department of Information Technology, Sandip Polytechnic, Page


Voting

In this model we used waterfall model for development of the web application.

Department of Information Technology, Sandip Polytechnic, Page


Voting

Figure 2.1: Waterfall model

Department of Information Technology, Sandip Polytechnic, Page


Voting

In this model we used following steps

A. Communication

Department of Information Technology, Sandip Polytechnic, Page


Voting

The software development process starts with communication between customer

and developer. In this phase we communicated with the user with following principles

Department of Information Technology, Sandip Polytechnic, Page


Voting

of communication phase.

We prepared before the communication i.e. we decide agenda of the meeting for

Department of Information Technology, Sandip Polytechnic, Page


Voting

concentrating on the features and services provided by other similar applications.

Our leader leads our team and drawn out all the requirement of from the user i.e.

what they actually needed, what is input, output format of system.

Department of Information Technology, Sandip Polytechnic, Page


Voting

B. Planning

It includes complete estimation, scheduling and risk analysis.

In this phase we planned about when to release the software, cost estimation, risk in

the project regarding messenger application and transfer of files in that.

Department of Information Technology, Sandip Polytechnic, Page


Voting
Finally, in this phase we estimated the cost of the project including all
expenditure of software, releasing software according to user deadline.

C. Modelling
It includes detail requirement analysis and project design. Flowchart shows
complete pictorial flow of program whereas algorithm is step by step solution of
problem.
We analyse the requirement of the user according to that we draw the block
diagrams of the system.
That is nothing but behavioural structure of the system using UML i.e. Class
Diagram, use case Diagram, Components Diagram etc.

D. Construction
It includes coding and testing steps:

1) Coding
Design details are implemented using appropriate programming language.
In coding we have chosen the JAVA programming language at the server side for
interacting with the database.For developing the android application, the JAVA
language is used.

2) Testing
Testing is carried out by analysing the application i.e. we first develop the
module of the application and step by step find out input and output errors such as

Interface errors, performance errors, data structure errors, initialization errors


etc. Therefore, here Black Box testing strategy is useful.

3) Deployment
It includes software delivery, support and feedback from customer. If user
suggest some corrections, or demands additional capabilities then changes are
required for such corrections or enhancements. After user evaluation, next spiral

Department of Information Technology, Sandip Polytechnic, Page


Voting
implementation, ‘user’s suggestions’ plus ‘enhancement plan’. Thus, each iteration
around the spiral leads to more completed version of software.

2.2 MODULES
There are two modules in our web application that are as follows:
1. Admin
2. Booth

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO:
SOFTWARE REQUIREMENT SPECIFICATION

3.1 REQUIREMENTS OF SYSTEM


3.1.1 HARDWARE REQUIREMENT
 Processor: Any type
 Main Memory: 2 GB
 Hard disk
 Arduino
 Fingerprint Sensor

3.1.2 SOFTWARE REQUIREMENT


 Platform: Windows 10
 IDE: Eclipse
 Programming language: JAVA, MySQL, HTML, CSS
 Server: Tomcat

3.2 DATA REQUIREMENT


To run this application we need Eclipse, Apache, XAMPP, MySQL, Server, Arduino,
PHP, HTML, CSS installed in laptop.

3.3 FUNCTIONAL REQUIREMENT


Thevoting system web app requires internet as well as fingerprint sensor to perform
its functionality.

3.4 EXTERNAL REQUIREMENT


We required Arduino board and fingerprint sensor as a hardware with internet
connection.

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO:
SYSTEM MODELING

4.1 DATA FLOW DIAGRAM


Data flow diagram(DFD) shows logical flow of system. Data flow diagrams are
more disciplined and structured. Data flow diagrams are quite readable independent
of complexity of system. The DFDs of the project as shown below:
Level 0 – Data Flow Diagram

Admin Main Page


Login

Booth
Figure 4.1.1: DFD Level-0 ofVoting System

Level 1 – Data Flow Diagram

Figure 4.1.2: DFD Level-1 ofVoting System

Department of Information Technology, Sandip Polytechnic, Page


Voting

4.2 UML DIAGRAM


Unified Modelling Language (UML) is a standardized modelling language used
todesign a software-based system model. UML includes a set of graphical diagrams.
There are two broad categories of diagrams as-
1. Structural diagram
2. Behavioural diagram

1. Structural Diagram:
The structural diagrams illustrate the static structure of the entire system.
TheseStatic structures represent the aspects of a diagram shows the main structure of
system. These static structuresare represented in the form of classes, objects,
interfaces,
Nodes, components etc. The four structural diagrams are-

Figure 4.2.1: Structural diagram ofVoting System

I. Component Diagram:
A Component diagram illustrates the pieces of software, embedded
controllers,etc. that will make up a system. A Component diagram hides the system
behaviourat higher level. The abstraction level of component diagram is more as

Department of Information Technology, Sandip Polytechnic, Page


Voting

compare toclass diagram. Component is composed by one or more classes.


Component diagramof proposed system is as shown in Figure 4.2.2.

Figure 4.2.2: Component Diagram ofVoting System

2. Behavioural Diagram:
These diagrams are used to represent dynamic aspects of the system. UML has
The following five types of behavioural diagrams-
I. Use case diagram
II. Activity diagram

I. Use Case Diagram:


A use case diagram in the type of behavioural diagram. It is defined by as well
as created from a use-case analysis. The main goal is to constitute the
graphicalstructure of the overall functionality provided by a system in terms of actors

Department of Information Technology, Sandip Polytechnic, Page


Voting

anddependencies between the use cases. Use case diagram of Universal Voting
System shown in Figure 4.2.4.

Fig4.2.3: Use Case Diagram for Voting System

II. Activity Diagram:


An activity diagram is a type of interaction diagram. Activity diagram is same
as flow chart diagram that represents flow of one activity to another activity.
Itmaintains the order of processes operate with one to another. Activity diagram
ofproposed system is as shown in Figure 4.2.5.

Department of Information Technology, Sandip Polytechnic, Page


Voting

Fig 4.2.4: Activity Diagram for Fingerprint Sensor

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO: 5
IMPLEMENTATION DETAILS

5.1 IMPLEMENTATION
One of the most critical decisions to be made was the LANGUAGE. The project deals
with user application so it required a language that provides all the required features
as well as it should be easy to use. So finally we arrived at conclusion to use java as
implementation language under net beans environment.

1.2 PLATFORM USED


1. Programming Language: Java
Java programming language was originally developed by Sun Microsystems
which was initiated by James Gosling and released in 1995 as core component
of Sun Microsystems' Java platform (Java 1.0 [J2SE]).
The latest release of the Java Standard Edition is Java SE 8. With the
advancement of Java and its widespread popularity, multiple configurations
were built to suit various types of platforms. For example: J2EE for Enterprise
Applications, J2ME for Mobile Applications.
The new J2 versions were renamed as Java SE, Java EE, and Java ME
respectively. Java is guaranteed to be Write Once, Run Anywhere.
Java is −
 Object Oriented − In Java, everything is an Object. Java can be easily
extended since it is based on the Object model.
 Platform Independent − unlike many other programming languages including
C and C++, when Java is compiled, it is not compiled into platform specific
machine, rather into platform independent byte code. This byte code is
distributed over the web and interpreted by the Virtual Machine (JVM) on
whichever platform it is being run on.
 Simple − Java is designed to be easy to learn. If you understand the basic
concept of OOP Java, it would be easy to master.

Department of Information Technology, Sandip Polytechnic, Page


Voting

 Secure − With Java's secure feature it enables to develop virus-free, tamper-


free systems. Authentication techniques are based on public-key encryption.
 Architecture-neutral − Java compiler generates an architecture-neutral object
file format, which makes the compiled code executable on many processors,
with the presence of Java runtime system.
 Portable − Being architecture-neutral and having no implementation
dependent aspects of the specification makes Java portable. Compiler in Java
is written in ANSI C with a clean portability boundary, which is a POSIX
subset.
 Robust − Java makes an effort to eliminate error prone situations by
emphasizing mainly on compile time error checking and runtime checking.
 Multithreaded − With Java's multithreaded feature it is possible to write
programs that can perform many tasks simultaneously. This design feature
allows the developers to construct interactive applications that can run
smoothly.
 Interpreted − Java byte code is translated on the fly to native machine
instructions and is not stored anywhere. The development process is more
rapid and analytical since the linking is an incremental and light-weight
process.
 High Performance − with the use of Just-In-Time compilers, Java enables
high performance.
 Distributed − Java is designed for the distributed environment of the internet.
 Dynamic − Java is considered to be more dynamic than C or C++ since it is
designed to adapt to an evolving environment. Java programs can carry
extensive amount of run-time information that can be used to verify and
resolve accesses to objects on run-time.
History of Java
James Gosling initiated Java language project in June 1991 for use in one of
his many set-top box projects. The language, initially called ‘Oak’ after an
oak tree that stood outside Gosling's office, also went by the name ‘Green’
and ended up later being renamed as Java, from a list of random words.

Department of Information Technology, Sandip Polytechnic, Page


Voting

Sun released the first public implementation as Java 1.0 in 1995. It


promised Write Once, Run Anywhere (WORA), providing no-cost run-times
on popular platforms.
On 13 November, 2006, Sun released much of Java as free and open source
software under the terms of the GNU General Public License (GPL).
On 8 May, 2007, Sun finished the process, making all of Java's core code free
and open-source, aside from a small portion of code to which Sun did not
hold the copyright.

2. Data base : MYSQL


MySQL is an Oracle-backed open source relational database management
system (RDBMS) based on Structured Query Language (SQL). MySQL runs
on virtually all platforms, including Linux, UNIX and Windows. Although it
can be used in a wide range of applications, MySQL is most often associated
with web applications and online publishing.
MySQL is an important component of an open source enterprise stack
called LAMP. LAMP is a web development platform that uses Linux as the
operating system, Apache as the web server, MySQL as the relational
database management system and PHP as the object-oriented scripting
language. (Sometimes Perl or Python is used instead of PHP.)
Originally conceived by the Swedish company MySQL AB, MySQL was
acquired by Sun Microsystems in 2008 and then by Oracle when it bought
Sun in 2010. Developers can use MySQL under the GNU General Public
License (GPL), but enterprises must obtain a commercial license from Oracle.
Today, MySQL is the RDBMS behind many of the top websites in the world
and countless corporate and consumer-facing web-based applications,
including Facebook, Twitter and YouTube.

3. GUI: HTML,CSS
First developed by Tim Berners-Lee in 1990, HTML is short for Hypertext
Mark-up Language. HTML is used to create electronic documents (called
pages) that are displayed on the World Wide Web. Each page contains a
series

Department of Information Technology, Sandip Polytechnic, Page


Voting

Department of Information Technology, Sandip Polytechnic, Page


Voting

of connections to other pages called hyperlinks. Every web page you see on
the Internet is written using one version of HTML code or another.
HTML code ensures the proper formatting of text and images so that
your Internet browser may display them as they are intended to look. Without
HTML, a browser would not know how to display text as elements or load
images or other elements. HTML also provides a basic structure of the page,
upon which Cascading Style Sheets are overlaid to change its appearance.
One could think of HTML as the bones (structure) of a web page, and CSS as
its skin (appearance).
Cascading Style Sheets (CSS) is a style sheet language used for describing
the presentation of a document written in a markup language like HTML. CSS
is a cornerstone technology of the World Wide Web, alongside HTML
and JavaScript.
CSS is designed to enable the separation of presentation and content,
including layout, colors, and fonts. This separation can improve
content accessibility, provide more flexibility and control in the specification
of presentation characteristics, enable multiple web pages to share formatting
by specifying the relevant CSS in a separate .css file, and reduce complexity
and repetition in the structural content.
Separation of formatting and content also makes it feasible to present the
same markup page in different styles for different rendering methods, such as
on-screen, in print, by voice (via speech-based browser or screen reader), and
on Braille-based tactile devices. CSS also has rules for alternate formatting if
the content is accessed on a mobile device.

5.2 MODULES & LANGUAGE USED


For every module in the software we have used java Language
5.3 COST
 Time Estimation
The working days: 25 days * 8 months = 200
days The working hours per day: 6 hours
Total time span for development: 1200 hours
 Cost Estimation

Department of Information Technology, Sandip Polytechnic, Page


Voting

Arduino cost: 2000 Rs.


Fingerprint sensor cost = 800 Rs/-
Installation of packages cost =1000Rs/-
So the total cost for the project will be approximately = 3800 Rs./-

CHAPTER NO: 6
CODING

6.1. JAVA CODING

Login page
package services;

importjava.io.IOException;
importjava.sql.*;
importjavax.servlet.ServletException;
importjavax.servlet.http.HttpServlet;
importjavax.servlet.http.HttpServletRequest;
importjavax.servlet.http.HttpServletResponse;

importconnectDB.*;

/**
* Servlet implementation class Login
*/
public class Login extends HttpServlet {
private static final long serialVersionUID = 1L;

/**
* Default constructor.
*/
public Login() {
// TODO Auto-generated constructor stub
super();

Department of Information Technology, Sandip Polytechnic, Page


Voting

/**
* @see HttpServlet#doGet(HttpServletRequest request, HttpServletResponse
response)
*/
protected void doGet(HttpServletRequest request,
HttpServletResponse response) throws ServletException, IOException {
// TODO Auto-generated method stub
response.getWriter().append("Served at:
").append(request.getContextPath());
}

/**
* @see HttpServlet#doPost(HttpServletRequest request, HttpServletResponse
response)
*/
protected void doPost(HttpServletRequest request, HttpServletResponse
response) throws ServletException, IOException {
// TODO Auto-generated method stub
doGet(request, response);

String email=request.getParameter("email");
String pass=request.getParameter("password");
if(email.equals("admin@gmail.com") &&pass.equals("admin"))
{
response.sendRedirect("addBooth.jsp");
}
els
e
{
try
{
Connection conn=DBconnect.getConnect();

Department of Information Technology, Sandip Polytechnic, Page


Voting

PreparedStatementps = conn.prepareStatement("select *
from booth where no=? and password=?");
ps.setString(1, email);
ps.setString(2, pass);
ResultSetrs =
ps.executeQuery(); if(rs.next())
{
response.sendRedirect("scanFinger.jsp");
}
else
{
request.getSession().setAttribute("msg", "Wrong
User Credentials..!!");
response.sendRedirect("login.jsp");
}
}

catch(Exception e)
{
e.printStackTrace();
}
}
}
}

Voter page
package services;

importjava.io.IOException;
importjava.sql.Connection;
importjava.sql.PreparedStatement;
importjava.sql.ResultSet;
importjava.sql.SQLException;

Department of Information Technology, Sandip Polytechnic, Page


Voting

Department of Information Technology, Sandip Polytechnic, Page


Voting

importjavax.servlet.ServletException;
importjavax.servlet.http.HttpServlet;
importjavax.servlet.http.HttpServletRequest;
importjavax.servlet.http.HttpServletResponse;
importjavax.servlet.http.HttpSession;

importconnectDB.DBconnect;

/**
* Servlet implementation class AddVoter
*/
public class AddVoter extends HttpServlet {
private static final long serialVersionUID = 1L;

/**
* @see HttpServlet#HttpServlet()
*/
publicAddVoter() {
super();
// TODO Auto-generated constructor stub
}

protected void doGet(HttpServletRequest request,


HttpServletResponse response) throws ServletException, IOException {
// TODO Auto-generated method stub
response.getWriter().append("Served at:
").append(request.getContextPath());
}

protected void doPost(HttpServletRequest request, HttpServletResponse


response) throws ServletException, IOException {
// TODO Auto-generated method stub
doGet(request, response);

Department of Information Technology, Sandip Polytechnic, Page


Voting

try
{

String id=request.getParameter("id");
String name=request.getParameter("name");
String mobile=request.getParameter("mobile");
String address=request.getParameter("address");
String mp=request.getParameter("mp");
String mla=request.getParameter("mla");
String corporator=request.getParameter("corporator");

HttpSession session = request.getSession(true); // reuse existing

session.setAttribute("user",mobile);
Connection conn=DBconnect.getConnect();

String sql="select mobile from voter


where mobile='"+mobile+"'";

PreparedStatementps=conn.prepareStatement(sql);
ResultSet r= ps.executeQuery();

if(r.next())
{
request.getSession().setAttribute("msg", "Duplicate
Mobile Number of Voter, Records Already Exist..!!");
response.sendRedirect("addVoter.jsp");
}
else
{
PreparedStatement ps1=conn.prepareStatement("insert
into voter values(?,?,?,?,?,?,?)");
ps1.setString(1,id);

Department of Information Technology, Sandip Polytechnic, Page


Voting

ps1.setString(2,name);
ps1.setString(3,mobile);
ps1.setString(4,mp);
ps1.setString(5,mla);
ps1.setString(6,corporator);
ps1.setString(7,address);

int n= ps1.executeUpdate();
System.out.println("Recort inserted");

if(n>=1)
{
request.getSession().setAttribute("msg",
"Record Inserted
Successfully..!!");
response.sendRedirect("addVoter.jsp");

}
else
{
request.getSession().setAttribute("msg",

"Record Failed To Insert..!!");


response.sendRedirect("addVoter.jsp");

}
}
}
catch (SQLException e)
{
// TODO Auto-generated catch block
e.printStackTrace();
}
}

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO: 7
TESTING

7.1 UNIT TESTING


Unit testing will be done by the developer and will be approved by the
development team leader. Proof of unit testing (test case list, sample output, data
Print outs, and defect information) must be provided by the programmer to the team
leader before unit testing will be accepted and passed on to the test person.

7.2 SYSTEM / INTEGRATION TESTING


Integration testing will be performed by the test manager and development
team leader with assistance from the individual developers as required. No specific
test tools are available for this project. Programs will enter into System/Integration
test after all critical defects have been corrected. A program may have up to two
major defects as long as they do not impede testing of the program.
The system is developed to autonomously navigate the robot in a
confined environment. The robot scans the distances of obstacles around it and maps
an efficient path out of it. Thus, we get a map of an arena and plotting is done.
The system was tested for accuracy, and tests were carried out to check
efficiency. The system must undergo tests to prove that it can stand the test for
various operations.

Department of Information Technology, Sandip Polytechnic, Page


Voting

7.3 TEST CASES AND RESULTS

Test Case ID TC_1


Test Case name Admin log in
To load the main GUI with different
Test case description Modules like log in button
Prerequisites Internet should be available
1. Enter invalid email id and valid
password for admin login
2. Click on login button.
Test steps
Expected Result 1. Invalid Email id…
Actual Result Invalid Email id
Status Pass
TABLE 7.3.1 TEST CASE FOR ADMIN LOGIN

Test Case ID TC_2


Test Case name
Add voter
Test case description
To enter valid Username, Mobile no,
Address, MP Ward ,MLA ward and
Corporator ward
Test steps 1. Enter valid Username
2. Enter valid Mobile Number, valid
Address, valid MP Ward, valid MLA
ward, valid Corporator.

3. Click on Add Voter Button.


Expected Result
All details are successfully accepted.
Actual Result
All details are successfully accepted.

Department of Information Technology, Sandip Polytechnic, Page


Voting

Status
Pass.
TABLE 7.3.2 TEST CASE FOR ADDING VOTERS
Test Case ID TC_3
Test Case name Add Candidate
To Enter valid Candidate Name, Mobile
Test case description Number ,Election Symbol, Ward
Number.
1. Enter valid Candidate Name
,Mobile Number, Election
Test steps Symbol.
2. Enter invalid Ward Number.
3. Click on Add Candidate.
Expected Result Invalid ward number.
Actual Result Invalid ward number.
Status Pass
TABLE 7.3.3 TEST CASE FOR ADDING CANDIDATE

Test Case ID TC_4


Test Case name Add booth
To Enter valid booth no, booth name,
Test case description
location and password.
1. Enter valid booth no , booth
Test steps name, location and password.
2. Click on add booth.
Expected Result Booth is added successfully
Actual Result Booth is added successfully
Status Pass
TABLE 7.3.4 TEST CASE FOR ADDING BOOTH

Department of Information Technology, Sandip Polytechnic, Page


Voting

Test Case ID TC_5


Test Case name Add ward
Test case description To Enter ward type and ward name.
1. Enter ward type and ward name.
Test steps
2. Click on add ward.
Expected Result Ward is added successfully
Actual Result Ward is added successfully
Status Pass
TABLE 7.3.5 TEST CASE FOR ADDING WARD

Test Case ID TC_6


To check whether it is scanning our
Test Case name
finger or not.
Test case description Put your finger on fingerprint sensor.
Test steps Place your finger on sensor properly.
Expected Result Successfully scanned.
Actual Result Successfully scanned.
Status Pass
TABLE 7.3.6 TEST CASE FOR FINGERPRINT BUTTON

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO: 8
CONCLUSIONS

So finally, from all of the information specified above we conclude that:

• It is easy and fast way for conducting voting.


• This is web application.
• Manual voting counting take much more time so it will remove the manual
vote counting.
• It is correct, efficient and reliable.
• Thus, voting system will implemented successfully.

Department of Information Technology, Sandip Polytechnic, Page


Voting

ADVANTAGES

Here are few advantages of Voting System


1) It satiates the need for fair and tumult free election.

2) As 3 layers of security is enforced, the scheme is compelled to remove all


malevolent tendencies.

3) The scheme is spoofing proof as encapsulation is adorned.

4) It obliterates the security loop-holes of the existing voting paradigm.

5) The design is economic and cheap.

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO: 9
FUTURE SCOPES

The scope of project revolves around the developing of an E-Voting system.


This system can be used for elections since it provide complete security and will
provide accurate results and save time and expenditure. This can be modify by
interfacing it with a PC through a serial port in order to provide additional security.
The system deals with how an E-vote process should be designed and implemented in
order to comply with the democratic election principles and rights as well as to other
human rights.

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO: 10
REFERENCES

1. wikipedia.org

2. AhmedBenAyed(2017);AConceptualSecureNFC–
BasedElectronicVotingSystem;InternationalJournalofNetwork
Security&ItsApplications(IJNSA)Vol.9,No.3,

3. PavelTarasovandHiteshTewari(2017);TheFutureofE-
Voting;IADISInternationalJournalonComputerScienceand
InformationSystemsVol.12,No.2,pp.148-165I

4. ZibinZheng1,ShaoanXie1,HongningDai2,XiangpingChen4,andHuaiminWang
3(2017);AnOverviewofNFC
Technology:Architecture,Consensus,andFutureTrends;IEEE6thInternationalC
ongressonBigData.

5. Jesse Yli-Huumo1, Deokyoon Ko2, Sujin Choi4*, Sooyong Park2, Kari


Smolander3(2016); Where Is Current Research on NFC Technology?—A
SystematicReview;PLOS-ONE.

6. MahdiH.Miraz1,MaarufAli2(2018);ApplicationsofNFCTechnologybeyondCryptoc
urrency;AnnalsofEmerging TechnologiesinComputing(AETiC)Vol.2,No.1,2018

7. MichaelCrosby,Google,Nachiappan,Yahoo,PradhanPattanayak,Yahoo,SanjeevVerm
a,SamsungResearchAmerica,VigneshKalyanaraman,FairchildSemiconductor(201
5);NFCTechnologyBeyondBitcoin.

Department of Information Technology, Sandip Polytechnic, Page


Voting

8. FreyaSheerHardwick,ApostolosGioulis,RajaNaeemAkram,andKonstantinosM
arkantonakis(2018);E-Votingwith NFC:AnE-
VotingProtocolwithDecentralisationandVoterPrivacy;arXiv:1805.10258v2[cs.
CR]
9. KibinLee,JoshuaI.James,TekachewGobenaEjeta,HyoungJoongKim(2016);Electron
icVotingServiceUsingNFC-A; Journal of Digital Forensics, Securityand Law.

10. AayushiGupta1*,JyotirmayPatel2,MansiGupta1,HarshitGupta1(2017);IssuesandEffe
ctivenessofNFCTechnology
onDigitalVoting;InternationalJournalofEngineeringandManufacturingScience.
ISSN2249-3115Vol.7,No.1(2017)

11. GautamSrivastava1,AshutoshDharDwivedi2andRajaniSingh2(2018);Crypto-
democracy:ADecentralizedVoting Scheme using NFCTechnology.

12. FriðrikÞ.Hjálmarsson,GunnlaugurK.Hreiðarsson(2018);NFC-BasedE-
VotingSystem.

13. NirKshetriandJeffreyvoas(2018);NFCEnabledE-
Voting;www.computer.org/software.

14. UmutCanÇabuk1,EylülAdıgüzel2,EnisKaraarslan2(2018);ASurveyonFeasibili
tyandSuitabilityofNFC Techniques for the E-Voting Systems; International
Journal of Advanced Research in Computer and Communication Engineering.

15. Madise,Ü.&Martens,T.(2006).E-
votinginEstonia2005.ThefirstpracticeofcountrywidebindingInternetvotinginthe
world. Electronic Voting,86.

16. S. Raval, “Decentralized Applications: Harnessing Bitcoin’s NFC Technology.”


O’Reilly Media, Inc. Sebastopol, California(2016).

17. JasonPaulCruz1,a)YuichiKaji2,b)(2017);E-

Department of Information Technology, Sandip Polytechnic, Page


Voting

votingSystemBasedontheBitcoinProtocolandBlindSignatures;IPSJ
TransactionsonMathematicalModelingandItsApplicationsVol.10No.114–22.

18. https://www.google.com/A+Simple+Representation+of+the+NFC+Structure+of+e
ach+Candidate+in+e+voting

19. http://www.doc.ic.ac.uk/~ma7614/topics_website/tech.html
.

Department of Information Technology, Sandip Polytechnic, Page


Voting

CHAPTER NO: 11
APPENDIX A

SCREENSHOTS

Fig.11.1: MAIN TAB

Department of Information Technology, Sandip Polytechnic, Page


Voting

Fig.11.2: ADMIN LOGIN TAB

Fig.11.2: BOOTH LOGIN TAB

Department of Information Technology, Sandip Polytechnic, Page


Voting

Fig.11.3: ADMIN TAB

Fig.11.3: BOOTH TAB

Department of Information Technology, Sandip Polytechnic, Page


Voting

Department of Information Technology, Sandip Polytechnic, Page


Voting

Department of Information Technology, Sandip Polytechnic, Page

You might also like