Professional Documents
Culture Documents
FINAL Sample - REPORT (2023) - 1
FINAL Sample - REPORT (2023) - 1
“VOTING SYSTEM ’’
SUBMITTED BY
KOMAL GANGURDE
SAKSHI AHIRE
DIVYA GADEKAR
SAKSHI JAIN
Prof. N. D. Dhamale
Certificate
This is to certify that the project report entitled“VOTING SYSTEM” has
been successfully completed by:
A. Komal Gangurde
B. SakshiAhire
C. DivyaGadekar
D. Sakshi Jain
With deep sense of gratitude we would like to thanks all the people who have lit
our path with their kind guidance. We are very grateful to these intellectuals who did
their best to help during our project work.
It is our proud privilege to express deep sense of gratitude to, Prof. P.M.
Dharmadhikari, Principal of Sandip Polytechnic, Nashik, for his comments and kind
permission tocomplete this project. We remain indebted to Prof. V. B. Ohol, H.O.D
Information Technology Department for their timely suggestion and valuable
guidance.
The special gratitude goes my guide Prof. ......... and staff members, technical
staff members of Information Technology Department for their expensive, excellent and
precious guidance in completion of this work. We thank to all the colleagues for their
appreciable help for our working project.
With various industry owners or lab technicians to help, it has been our
endeavour to throughout our work to cover the entire project work.
We are also thankful to our parents who providing their wishful support for our
project completion successfully.
And lastly we thanks to our all friends and the people who are directly or
indirectly related to our project work.
KOMAL GANGURDE
SAKSHI AHIRE
DIVYA GADEKAR
SAKSHI JAIN
INDEX
Page
Chapter No. Particular
No.
Abstract 1
1 Preamble 2
1.1 Introduction 2
1.2 Review of Literature 2
1.3 Problem Statement 5
2 System Architecture 8
2.1 Methodology 8
2.2 Modules 10
4 System Modelling 12
4.1 Dataflow Diagrams 12
4.2 UML Diagram 13
5 Implementation Details 17
5.1 Implementation 17
5.1.2 Platform Used 17
5.2 Modules and Language Used 20
5.3 Cost 20
6 Coding 21
7 Testing 27
7.1 Unit Testing 27
7.2 System / Integration Testing 27
7.3 Test Cases and Results 28
8 Conclusion 31
8.1 Advantages 32
9 Future Scope 33
10 References 34
11 Appendix A 37
FIGURE INDEX
Page
Figure No. Particular
No.
2.1 Waterfall Model of Software Development 8
4.1.1 Data Flow Diagram - Level 0 12
4.1.2 Data Flow Diagram - Level 1 12
4.2.1 Structural Diagram for Voting system 13
TABLE INDEX
Page
Table No. Particular
No.
7.3.1 Test Case for Admin 28
7.3.2 Test Case for Adding voter 28
7.3.3 Test Case for Adding candidate 29
7.3.4 Test Case for Adding booth 29
Abstract
CHAPTER NO:1
PREAMBLE
1.1 INTRODUCTION
The token is shipped by the administrator to every citizen through his or her
within the email message sent to the voters. Once and for all, the University of
Metropolis On-line Legal System with identity verification project, has been ready to
deliver AN electronic legal system that solves all the highlighted challenges of the
giving voters a sure and credible suggests that of physical exercise their franchise
with nice ease. It’s thus counselled to be deployed totally in resulting workers
elections.
We have gone through some voting systems the overview of them are as bellows:
This paper deals with design, build and test an online voting system that
facilitates user (the person who is eligible for voting), candidate (Candidate
are the users who are going to stand in elections for their respective party),
online voting. This online voting system is highly secured, and its design is
very simple, ease of use and also reliable. The proposed software is developed
and tested to work on Ethernet and allows online voting. It also creates and
manages voting and an election detail as all the users must login by user name
and password and click on his favorable candidates to register vote. This will
The project voting system with biometric authentication is an electronic voting system
which seeks to make use of the uniqueness of the minutiae of the human finger print
to future enhance the level of trust and confidentiality of the voters in the system as
well as making the actual process as universally accessible as possible which would
be achieved through the deployment on the internet.
The aims to make this project is to develop an application that seeks to use various
stages of security authentication to enhance the electioneering process for staff
elections using the case study that is the university of IBADAN, ultimately providing
an online platform which enables voters to exercise their franchise from any location
during the election period.
The following points are implemented in proposed system:-
A. The voter registration an authentication process which are perform on the desktop
module the voter is expected to have his/her fingerprint captured and the minute
extracted that is stored on the database.
B. In this system we have created a secure online voting platform where authenticity
of votes and voters are ensured with the use of mechanisms such as fingerprints
registrations.
C. We also improve voter’s identification since biometric features cannot be shared.
D. We also avoid the problems of queuing during voting period on elections.
E. This system is become a spoofing proof encapsulation is adorned.
1. Technical Feasibility:
The Project needs open source software’s and some hardware part like
fingerprint sensor which is easily available. Also, it is available at moderate cost and
can be purchased easily.
3. Time Feasibility:
4. Operational Feasibility:
For the operation needs id and password for admin and voter needs to enrol
fingerprint.
CHAPTER NO: 2
SYSTEM ARCHITECTURE
2.1 METHODOLOGY
In this model we used waterfall model for development of the web application.
A. Communication
and developer. In this phase we communicated with the user with following principles
of communication phase.
We prepared before the communication i.e. we decide agenda of the meeting for
Our leader leads our team and drawn out all the requirement of from the user i.e.
B. Planning
In this phase we planned about when to release the software, cost estimation, risk in
C. Modelling
It includes detail requirement analysis and project design. Flowchart shows
complete pictorial flow of program whereas algorithm is step by step solution of
problem.
We analyse the requirement of the user according to that we draw the block
diagrams of the system.
That is nothing but behavioural structure of the system using UML i.e. Class
Diagram, use case Diagram, Components Diagram etc.
D. Construction
It includes coding and testing steps:
1) Coding
Design details are implemented using appropriate programming language.
In coding we have chosen the JAVA programming language at the server side for
interacting with the database.For developing the android application, the JAVA
language is used.
2) Testing
Testing is carried out by analysing the application i.e. we first develop the
module of the application and step by step find out input and output errors such as
3) Deployment
It includes software delivery, support and feedback from customer. If user
suggest some corrections, or demands additional capabilities then changes are
required for such corrections or enhancements. After user evaluation, next spiral
2.2 MODULES
There are two modules in our web application that are as follows:
1. Admin
2. Booth
CHAPTER NO:
SOFTWARE REQUIREMENT SPECIFICATION
CHAPTER NO:
SYSTEM MODELING
Booth
Figure 4.1.1: DFD Level-0 ofVoting System
1. Structural Diagram:
The structural diagrams illustrate the static structure of the entire system.
TheseStatic structures represent the aspects of a diagram shows the main structure of
system. These static structuresare represented in the form of classes, objects,
interfaces,
Nodes, components etc. The four structural diagrams are-
I. Component Diagram:
A Component diagram illustrates the pieces of software, embedded
controllers,etc. that will make up a system. A Component diagram hides the system
behaviourat higher level. The abstraction level of component diagram is more as
2. Behavioural Diagram:
These diagrams are used to represent dynamic aspects of the system. UML has
The following five types of behavioural diagrams-
I. Use case diagram
II. Activity diagram
anddependencies between the use cases. Use case diagram of Universal Voting
System shown in Figure 4.2.4.
CHAPTER NO: 5
IMPLEMENTATION DETAILS
5.1 IMPLEMENTATION
One of the most critical decisions to be made was the LANGUAGE. The project deals
with user application so it required a language that provides all the required features
as well as it should be easy to use. So finally we arrived at conclusion to use java as
implementation language under net beans environment.
3. GUI: HTML,CSS
First developed by Tim Berners-Lee in 1990, HTML is short for Hypertext
Mark-up Language. HTML is used to create electronic documents (called
pages) that are displayed on the World Wide Web. Each page contains a
series
of connections to other pages called hyperlinks. Every web page you see on
the Internet is written using one version of HTML code or another.
HTML code ensures the proper formatting of text and images so that
your Internet browser may display them as they are intended to look. Without
HTML, a browser would not know how to display text as elements or load
images or other elements. HTML also provides a basic structure of the page,
upon which Cascading Style Sheets are overlaid to change its appearance.
One could think of HTML as the bones (structure) of a web page, and CSS as
its skin (appearance).
Cascading Style Sheets (CSS) is a style sheet language used for describing
the presentation of a document written in a markup language like HTML. CSS
is a cornerstone technology of the World Wide Web, alongside HTML
and JavaScript.
CSS is designed to enable the separation of presentation and content,
including layout, colors, and fonts. This separation can improve
content accessibility, provide more flexibility and control in the specification
of presentation characteristics, enable multiple web pages to share formatting
by specifying the relevant CSS in a separate .css file, and reduce complexity
and repetition in the structural content.
Separation of formatting and content also makes it feasible to present the
same markup page in different styles for different rendering methods, such as
on-screen, in print, by voice (via speech-based browser or screen reader), and
on Braille-based tactile devices. CSS also has rules for alternate formatting if
the content is accessed on a mobile device.
CHAPTER NO: 6
CODING
Login page
package services;
importjava.io.IOException;
importjava.sql.*;
importjavax.servlet.ServletException;
importjavax.servlet.http.HttpServlet;
importjavax.servlet.http.HttpServletRequest;
importjavax.servlet.http.HttpServletResponse;
importconnectDB.*;
/**
* Servlet implementation class Login
*/
public class Login extends HttpServlet {
private static final long serialVersionUID = 1L;
/**
* Default constructor.
*/
public Login() {
// TODO Auto-generated constructor stub
super();
/**
* @see HttpServlet#doGet(HttpServletRequest request, HttpServletResponse
response)
*/
protected void doGet(HttpServletRequest request,
HttpServletResponse response) throws ServletException, IOException {
// TODO Auto-generated method stub
response.getWriter().append("Served at:
").append(request.getContextPath());
}
/**
* @see HttpServlet#doPost(HttpServletRequest request, HttpServletResponse
response)
*/
protected void doPost(HttpServletRequest request, HttpServletResponse
response) throws ServletException, IOException {
// TODO Auto-generated method stub
doGet(request, response);
String email=request.getParameter("email");
String pass=request.getParameter("password");
if(email.equals("admin@gmail.com") &&pass.equals("admin"))
{
response.sendRedirect("addBooth.jsp");
}
els
e
{
try
{
Connection conn=DBconnect.getConnect();
PreparedStatementps = conn.prepareStatement("select *
from booth where no=? and password=?");
ps.setString(1, email);
ps.setString(2, pass);
ResultSetrs =
ps.executeQuery(); if(rs.next())
{
response.sendRedirect("scanFinger.jsp");
}
else
{
request.getSession().setAttribute("msg", "Wrong
User Credentials..!!");
response.sendRedirect("login.jsp");
}
}
catch(Exception e)
{
e.printStackTrace();
}
}
}
}
Voter page
package services;
importjava.io.IOException;
importjava.sql.Connection;
importjava.sql.PreparedStatement;
importjava.sql.ResultSet;
importjava.sql.SQLException;
importjavax.servlet.ServletException;
importjavax.servlet.http.HttpServlet;
importjavax.servlet.http.HttpServletRequest;
importjavax.servlet.http.HttpServletResponse;
importjavax.servlet.http.HttpSession;
importconnectDB.DBconnect;
/**
* Servlet implementation class AddVoter
*/
public class AddVoter extends HttpServlet {
private static final long serialVersionUID = 1L;
/**
* @see HttpServlet#HttpServlet()
*/
publicAddVoter() {
super();
// TODO Auto-generated constructor stub
}
try
{
String id=request.getParameter("id");
String name=request.getParameter("name");
String mobile=request.getParameter("mobile");
String address=request.getParameter("address");
String mp=request.getParameter("mp");
String mla=request.getParameter("mla");
String corporator=request.getParameter("corporator");
session.setAttribute("user",mobile);
Connection conn=DBconnect.getConnect();
PreparedStatementps=conn.prepareStatement(sql);
ResultSet r= ps.executeQuery();
if(r.next())
{
request.getSession().setAttribute("msg", "Duplicate
Mobile Number of Voter, Records Already Exist..!!");
response.sendRedirect("addVoter.jsp");
}
else
{
PreparedStatement ps1=conn.prepareStatement("insert
into voter values(?,?,?,?,?,?,?)");
ps1.setString(1,id);
ps1.setString(2,name);
ps1.setString(3,mobile);
ps1.setString(4,mp);
ps1.setString(5,mla);
ps1.setString(6,corporator);
ps1.setString(7,address);
int n= ps1.executeUpdate();
System.out.println("Recort inserted");
if(n>=1)
{
request.getSession().setAttribute("msg",
"Record Inserted
Successfully..!!");
response.sendRedirect("addVoter.jsp");
}
else
{
request.getSession().setAttribute("msg",
}
}
}
catch (SQLException e)
{
// TODO Auto-generated catch block
e.printStackTrace();
}
}
CHAPTER NO: 7
TESTING
Status
Pass.
TABLE 7.3.2 TEST CASE FOR ADDING VOTERS
Test Case ID TC_3
Test Case name Add Candidate
To Enter valid Candidate Name, Mobile
Test case description Number ,Election Symbol, Ward
Number.
1. Enter valid Candidate Name
,Mobile Number, Election
Test steps Symbol.
2. Enter invalid Ward Number.
3. Click on Add Candidate.
Expected Result Invalid ward number.
Actual Result Invalid ward number.
Status Pass
TABLE 7.3.3 TEST CASE FOR ADDING CANDIDATE
CHAPTER NO: 8
CONCLUSIONS
ADVANTAGES
CHAPTER NO: 9
FUTURE SCOPES
CHAPTER NO: 10
REFERENCES
1. wikipedia.org
2. AhmedBenAyed(2017);AConceptualSecureNFC–
BasedElectronicVotingSystem;InternationalJournalofNetwork
Security&ItsApplications(IJNSA)Vol.9,No.3,
3. PavelTarasovandHiteshTewari(2017);TheFutureofE-
Voting;IADISInternationalJournalonComputerScienceand
InformationSystemsVol.12,No.2,pp.148-165I
4. ZibinZheng1,ShaoanXie1,HongningDai2,XiangpingChen4,andHuaiminWang
3(2017);AnOverviewofNFC
Technology:Architecture,Consensus,andFutureTrends;IEEE6thInternationalC
ongressonBigData.
6. MahdiH.Miraz1,MaarufAli2(2018);ApplicationsofNFCTechnologybeyondCryptoc
urrency;AnnalsofEmerging TechnologiesinComputing(AETiC)Vol.2,No.1,2018
7. MichaelCrosby,Google,Nachiappan,Yahoo,PradhanPattanayak,Yahoo,SanjeevVerm
a,SamsungResearchAmerica,VigneshKalyanaraman,FairchildSemiconductor(201
5);NFCTechnologyBeyondBitcoin.
8. FreyaSheerHardwick,ApostolosGioulis,RajaNaeemAkram,andKonstantinosM
arkantonakis(2018);E-Votingwith NFC:AnE-
VotingProtocolwithDecentralisationandVoterPrivacy;arXiv:1805.10258v2[cs.
CR]
9. KibinLee,JoshuaI.James,TekachewGobenaEjeta,HyoungJoongKim(2016);Electron
icVotingServiceUsingNFC-A; Journal of Digital Forensics, Securityand Law.
10. AayushiGupta1*,JyotirmayPatel2,MansiGupta1,HarshitGupta1(2017);IssuesandEffe
ctivenessofNFCTechnology
onDigitalVoting;InternationalJournalofEngineeringandManufacturingScience.
ISSN2249-3115Vol.7,No.1(2017)
11. GautamSrivastava1,AshutoshDharDwivedi2andRajaniSingh2(2018);Crypto-
democracy:ADecentralizedVoting Scheme using NFCTechnology.
12. FriðrikÞ.Hjálmarsson,GunnlaugurK.Hreiðarsson(2018);NFC-BasedE-
VotingSystem.
13. NirKshetriandJeffreyvoas(2018);NFCEnabledE-
Voting;www.computer.org/software.
14. UmutCanÇabuk1,EylülAdıgüzel2,EnisKaraarslan2(2018);ASurveyonFeasibili
tyandSuitabilityofNFC Techniques for the E-Voting Systems; International
Journal of Advanced Research in Computer and Communication Engineering.
15. Madise,Ü.&Martens,T.(2006).E-
votinginEstonia2005.ThefirstpracticeofcountrywidebindingInternetvotinginthe
world. Electronic Voting,86.
17. JasonPaulCruz1,a)YuichiKaji2,b)(2017);E-
votingSystemBasedontheBitcoinProtocolandBlindSignatures;IPSJ
TransactionsonMathematicalModelingandItsApplicationsVol.10No.114–22.
18. https://www.google.com/A+Simple+Representation+of+the+NFC+Structure+of+e
ach+Candidate+in+e+voting
19. http://www.doc.ic.ac.uk/~ma7614/topics_website/tech.html
.
CHAPTER NO: 11
APPENDIX A
SCREENSHOTS