report 8th

77
CHAPTER 1 INTRODUCTION 1.1 Online Voting System Online voting system is an online voting technique. In this system who have citizenship of India and whose age is above 18 years of age and any gender can give his\her vote online without going to any physical polling station. There is a database which is maintained in which all the names of voters and there unique voter id with complete information is stored. In “Online voting system” a voter can use his\her voting online without any difficulty, All they need is to registered themselves to caste to vote. Registration is mainly done by the administrator for security reasons. The administrator registers the voters on a client site of the system. Citizens seeking registration are expected to submit their details. After the validity of them being citizens of India has been confirmed by the administrator by comparing their details submitted with those in existing database such as 1

Upload: samuel-davis

Post on 15-Apr-2017

221 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Report 8th

CHAPTER 1

INTRODUCTION

1.1Online Voting System

Online voting system is an online voting technique. In this system who have

citizenship of India and whose age is above 18 years of age and any gender can give

his\her vote online without going to any physical polling station.

There is a database which is maintained in which all the names of voters and there

unique voter id with complete information is stored.

In “Online voting system” a voter can use his\her voting online without any difficulty,

All they need is to registered themselves to caste to vote. Registration is mainly done

by the administrator for security reasons. The administrator registers the voters on a

client site of the system. Citizens seeking registration are expected to submit their

details.

After the validity of them being citizens of India has been confirmed by the

administrator by comparing their details submitted with those in existing database

such as those as the Registration of Person, the citizen is then registered as a voter.

After registration, the voter can use to login into the system to vote with the help of

their vote id no. if the invalid or wrong details are submitted, then the citizen is not

allowed to caste there vote.

It is a electronic way to choose a leader via a web based application. The unique part

of the online voting system is that the voter have the choice of voting at there own

free time ,so it is more time efficient and convenient for the voter to caste the vote.

1

Page 2: Report 8th

1.2Background

The online voting system is also known as e-voting is a term encompassing several

different types of voting embracing both electronic means of counting voters. It can

involve transmission of ballots and votes via telephones, private computer network.

Online voting is an electronic way of choosing leaders by a web based application.

The advantages of online voting over the common queue method is that the voters

have the choice of voting at their own free time and there is reduced congestion. It

also minimizes on errors of vote counting. The individual votes are submitted in a

database which can be queried to find out who of the aspirants for a given post has

the highest number of votes.

With the online voting system a voter can use his\her voting right online without any

difficulty. He\she has to register as a voter first before being authorized to vote.

However, nor just anybody can vote, for one to participate in elections, he\she must

have the requirements. Initially he\she must be a registered citizen that is must be 18

and aboveyears old. As already mentioned that the online voting system is limited

only to registered voters.

Online voting system are appealing for several reasons which include, people are

getting more used to work with computers to do all sorts of things.

1.3Need Of Online Voting System

The need of the online voting system include:

1. Provision of improved voting services to the voters through fast, timely and

convenient voting

2. Increased number of voters as individual will find it easier and more convenient to

vote, especially those abroad

2

Page 3: Report 8th

3. Reduction of the costs incurred by the Electoral Commission during voting time in

paying the clerks employed for the sake of the success of the manual system

4. Check to ensure that the members who are registered are the only ones to caste the

vote.

5. Online voting system will being very cost cutting to produce an effective election

management system.

6. It is easier to independently moderate the elections and subsequently reinforce its

transparency and fairness.

7. Less capital, less effort and less labor intensive, as the primary cost and effort will

focus primarily on creating, managing, and running a secure online portal.

1.4 Importance Of Online Voting System

The online voting system use to reduce the time spend making long queues at the

polling stations during voting. It shall also enable the voters to vote from nay part of

the globe as explained since this is an online application available on the internet.

cases of vote miscounts shall also be solved since at the backend of this system

resides a well developed databases using my sql that can provide the correct data

once its correctly queried. Since the voting process shall be open as early as possible

the voters, shall have ample time to decide when and whom to vote for.

1.5 Security Issue of Online Voting System

The origin of the security issues was due to not only the outsider but also inside ,even

just because of the inheritance of some objects in the source code are unsuitable.

These errors caused the voting system to crash. So we can design our systems to

transmit data without networking. Its also use to limit voter input particular data, so

that we can prevent the command injection from running.

3

Page 4: Report 8th

We recommend only using the two groups in this and they are client side and

admin side.

Client side include

1. Voter_id

2. Password

3. Voter Name

4. Party Name

Administration side include

1 User Name

2 Password

VOTER_ID : Voter ID card or Electors Photo Identity Card. It is an identification

card issued by the Election Commission to all eligible voters, to enable voter

identification on Election Day. All those who are already enrolled in the voter list are

eligible to receive a voter ID card. It is very important for the citizen to have there

voter_id card, as it help us you ti cast the vote to your desirable candidate party. Its

act as an identity proof on that day.

PASSWORD OF VOTER: A password is basically a secret word or phrase known

only to a restricted people. It is known by the user only.

VOTER NAME: It is the name of the citizen who is allowed to caste the vote after

being registered. Every citizen is assigned with the unique voter id with the election

commission.

PARTY NAME: It consist of the name of the party which are going to stand for the

election. There are many different party in India such as Congress, BJP, APP, BSP,

SP, TCM. Citizen needs to select the candidate from the desire party they want to

choice.

4

Page 5: Report 8th

USER NAME: There is only one user in admin who is allowed to see the result of

the vote. It is basically done for the sake of the security purpose.

PASSWOPRD OF USER: The password of the user should be known to him only.

No one else should know the password of the user.

In this we also use the two buttons and they are LOGIN button and SUBMIT button.

The role of the LOGIN button is to allow the voter to cast their vote once they

registered themselves, and the SUBMIT button is to allow the new user to registered

themselves if they are not registered with the required details in the form in which

they have to enter their voter id. Those who have the voter id are only to allow to

continue the process of the form, then after that they need to fill their personal details

like your Name, Father name, Gender, Date of birth, Address and at the last

Password.

5

Page 6: Report 8th

CHAPTER 2

SYSTEM ANALYSISAfter investigation it is essential to determine whether the project is feasible or not. In

feasibility study is tested whether the system to be developed would be able to

accomplish its task on the working ground. It impact was also found to be not

adverse. It was found that the user’s requirements would be met and resources would

be used in an effective manner.

2.1 Feasibility Study

After investigation it is essential to determine whether the project is feasible or not.

In feasibility study is tested whether the system to be developed would be able to

accomplish its task on the working ground. It impact was also found to be not

adverse. It was found that the user’s requirements would be met and resources would

be used in an effective manner. In feasibility study the important aspects related to the

project were considered like the problem definition and the process for solution. The

cost and benefit analysis was also done.

2.2 Feasibility considerations

To do a feasibility study, the economic, technical, and behavioral factors in the

system developed were considered.

The three key considerations were as follows:

Economic Feasibility

The project ONLINE VOTING SYSTEM was within budget and producing the

desire results. The labor or the human were considered of two group members of the

project.

6

Page 7: Report 8th

Technical Feasibility

Technical Feasibility revolves around the technical support of the project. The main

infrastructure of the project included the project labs in the college campus. The

systems there were easily able to absorb the new software being installed. The project

thus was technically feasible. The equipment and the software produced no problem.

The project’s technical requirements were met. The project could be made to work

correctly, fulfilling its task, with the existing software and personnel.

2.3 Operational Feasibility

2.3.1 System Requirement

System Requirement are the minimum requirement that are needed to run the

software.

2.3.2 Hardware Requirement

1.Processor: Anyone

2.keyboard: Mouse

3.Display: Device

2.3.3 Software Requirement

1. wamp sever

2. html

3. Browser

4. mysql

7

Page 8: Report 8th

2.4 Software Description

The detailed description is as follow-

2.4.1 Front End

HTML: It stands for Hyper Text Markup Language is the standard markup

language used to create web pages. It is basically use for the designing purposes.

HTML is written in the form of HTML elements consisting of tags enclosed in angle

brackets like <html>. HTML tags most commonly come in pairs

like <h1> and </h1>, although some tags represent empty elements and so are

unpaired, for example <img>. The first tag in a pair is the start tag, and the second tag

is the end tag and they are also called opening tags and closing tags

In web page designing its objective is to format the data on these pages. It uses the

tags or markups to determine how the different data contents will be displayed on a

web page. We can write the HTML code in any text editor program. Few years ago, it

was developed as a subset of SGML, where SGML stands for structured generalized

mark-up language. The SGML also is used to describe the formatting and mar-up

links and different contents of a document.

The purpose of a web browser is to read HTML documents and compose them into

visible or audible web pages. The browser does not display the HTML tags, but uses

the tags to interpret the content of the page. HTML describes the structure of a

website semantically along with cues for presentation, making it a markup

language rather than a programming language.

HTML elements form the building blocks of all websites. HTML allows images and

objects to be embedded and can be used to create interactive forms. It provides a

means to create structured documents by denoting structural semantics for text such

as headings, paragraphs, lists, links, quotes and other items. It can

embed scripts written in languages such as JavaScript which affect the behavior of

HTML web pages.

8

Page 9: Report 8th

Web browsers can also refer to Cascading Style Sheets to define the look and layout

of text and other material. TheW3C, maintainer of both the HTML and the CSS

standards, encourages the use of CSS over explicit presentational HTML. It also

consists of several key components, including tags and their attributes, character-

based data types. Another important component is the document type declaration,

which triggers standards mode rendering.

HTML is important as the base language that css, and php plug in to. It provides the

content that css styles, and php links to a database to simplify their functions.

It is the best language for website creation. It has several benefits a number of

them are:

1. A significant benefit of HTML it is free of charge and no need to install any

software.

2. HTML is simple to use and understand. and high speed loading time.

3. Most development tools whatever they are paid or free all support HTML.

4. HTML and XML syntax is extremely similar.

PHP: It is a server-side scripting language designed for web development but also

used as a general-purpose programming language.

PHP code is interpreted by a web server with a PHP processor module, which

generates the resulting web page: PHP commands can be embedded directly into

an HTML source document rather than calling an external file to process data. It has

also evolved to include a command-line interface capability and can be used

in standalone graphical applications.

PHP is free software released under the PHP License. PHP has been widely ported

and can be deployed on most web servers on almost every operating

system and platform, free of charge.

9

Page 10: Report 8th

The PHP interpreter only executes PHP code within its delimiters. Anything outside

its delimiters is not processed by PHP. The most common delimiters are <?php to

open and ?> to close PHP sections. <script language= "php"> and </script> delimiters

are also available, as are the shortened forms <?.

Variables are prefixed with a dollar symbol, and a type does not need to be specified

in advance. Unlike function and class names, variable names are case sensitive. Both

double-quoted ("") and strings provide the ability to interpolate a variable's value into

the string. PHP treats newlines as whitespace in the manner of a free-form language

and statements are terminated by a semicolon. It has three types of comment

syntax: /* */ marks block and inline comments; // as well as # are used for one-line

comments. The echo statement is one of several facilities PHP provides to output

text, e.g., to a web browser.

In terms of keywords and language syntax, PHP is similar to most high level

languages that follow the C style syntax. if conditions, for and while loops, and

function returns are similar in syntax to languages such as C, C++, C#, Java and Perl.

It stores whole numbers in a platform-dependent range, either a 64-bit or 32-

bit signed integer equivalent to the C-language long type. Unsigned integers are

cconverted to signed values in certain situations; this behavior is different from other

programming languages. Integer variables can be assigned using decimal positive and

negative, octal, hexadecimal, and binary notations.

Arrays can contain elements of any type that PHP can handle, including resources,

objects, and even other arrays. Order is preserved in lists of values and in hashes with

both keys and values, and the two can be intermingled. PHP also supports strings,

which can be used with single quotes, double quotes.

PHP has hundreds of functions provided by the core language functionality and

thousands more available via various extensions; these functions are well documented

in the online PHP documentation.

10

Page 11: Report 8th

It is a general-purpose scripting language that is especially suited to server-side web

development where it generally runs on a web server. Any PHP code in a requested

file is executed by the PHP runtime, usually to create dynamic web page content. It

can also be used for command-line scripting and client-side graphical user

interface GUI applications. PHP can be deployed on most web servers,

many operating systems and platforms, and can be used with many relational

database management systems RDBMS. Most web hosting providers support PHP for

use by their clients. It is available free of charge, and the PHP Group provides the

complete source code for users to build, customize and extend for their own use.[9]

PHP acts primarily as a filter, taking input from a file or stream containing text and its

instructions and outputting another stream of data. Most commonly the output will be

HTML.

Originally designed to create dynamic web pages, PHP focuses mainly on server-side

scripting, and it is similar to other server-side scripting languages that provide

dynamic content from a web server to a client, such. It has also attracted to the

development of many software frame works that provide building blocks.

2.4.2 Back End

SQL: It is Structured Query Language is a special-purpose programming language

designed for managing data held in a relational database management system .

Originally based upon relational algebra , SQL consists of a data definition

language and a data manipulation language. The scope of SQL includes data insert,

query, update and delete, schema creation and modification, and data access control.

Although SQL is often described as, and to a great extent is, a declarative language, it

includes procedural elements.

SQL was one of the first commercial language, A Relational Model of Data for Large

Shared Data Banks. Despite not entirely adhering to the relational model as described

by code . It became the most widely used database language.

11

Page 12: Report 8th

SQL became a standard of the American National Standards Institute  in 1986, and of

the International Organization for Standardization  in 1987. Since then, the standard

has been enhanced several times with added features. Despite these standards, code is

not completely portable among different database systems, which can lead to vendor

lock-in. The different makers do not perfectly adhere to the standard, for instance by

adding extensions, and the standard itself is sometimes ambiguous.

The SQL language is subdivided into several language elements, including:

1. Clauses: which are constituent components of statements and queries.

2. Expressions, which can produce either scalar values, or tables consisting

of columns and rows of data.

3. Predicates, which specify conditions that can be evaluated to sql or Boolean and

which are used to limit the effects of statements and queries, or to change

program flow.

4. Queries, which retrieve the data based on specific criteria. This is an important

element of SQL.

12

Page 13: Report 8th

CHAPTER 3

SOFTWARE DESIGNDesign is the first step into the development phase for any engineered product or

system. Design is a creative process. A good design is the key to effective system.

The term “design” is defined as “the process of applying various techniques and

principles for the purpose of defining a process or a system in sufficient detail to

permit its physical realization”.

3.1 Logical Design

The logical flow of a system and define the boundaries of a system. It includes the

following steps:

1. Reviews the current physical system – its data flows, file content, volumes,

Frequencies etc.

2. Prepares output specifications – that is, determines the format, content and

Frequency of reports.

3.2 Physical Design

Physical system produces the working systems by define the design specifications

that tell the programmers exactly what the candidate system must do. It includes the

following steps.

1. Design the physical system.

2. Specify input and output media.

3. Design the database and specify backup procedures.

13

Page 14: Report 8th

3.3 Input Design

The input design is the link between the information system and the user. It comprises

the developing specification and procedures for data preparation and those steps are

necessary to put transaction data in to a usable form for processing can be achieved

by inspecting the computer to read data from a written or printed document or it can

occur by having people keying the data directly into the system.

3.4 Output Design

A quality output is one, which meets the requirements of the end user and presents

the information clearly. In any system results of processing are communicated to the

users and to other system through outputs. It is the most important and direct source

information to the user. Efficient and intelligent output design improves the system’s

relationship to help user decision-making.

1. Designing computer output should proceed in an organized, well thought out

manner the right output must be developed while ensuring that each output element

is designed so that people will find the system can use easily and effectively.

2. Select methods for presenting information.

3. Create document, report, or other formats that contain information produced by

the system.

14

Page 15: Report 8th

Online Voting System

User Administrator

Voter_id, password

Result

3.5 Data Flow Diagram

Context free diagram

DFD- Administrator

party detail

Voter Id, Password

successful party details

list of party

voters details vote

accumulated

votes votes

vote accepted

15

User

Login

VotingEndorsed Party

Nomination

Process

Party

Result

Electoral roll

Page 16: Report 8th

Level DFD- User

vvvvvvvvvvv

Database

Database

3.6 Database Design

A database is an organized mechanism that has the capability of storing information

through which a user can retrieve stored information in an effective and efficient

manner. The data is the purpose of any database and must be protected. The database

design is a two level process. In the first step, user requirements are gathered together

and a database is designed which will meet these requirements as clearly as possible.

16

VoterRegistration

ProcessCandidate

Registered Voter Registered Candidate

Voting

Admin

Summation of Votes Authentication Process

Page 17: Report 8th

This step is called Information Level Design and it is taken independent of any

individual DBMS. The organization of the data in the database is aimed to achieve

the following two major objectives.

1. Data Integrity

2. Data independence

3.7 Relational Database Management System A relational model represents the database as a collection of relations. Each relation

resembles a table of values or file of records. In formal relational model terminology,

a row is called a tuple , a column header is called an attribute and the table is called a

relation. A relational database consists of a collection of tables, each of which is

assigned a unique name. A row in a tale represents a set of related values.

3.8 Tables Structure

Table Name: Admin

Fieldname Data Type Length Key

Username Varchar 20 Primary key

Password Varchar 9 -

Table Name: Sign

Fieldname Data Type Length Key

Voter_id No Varchar 20 Primary key

Name Varchar 20 -

Fname Varchar 20 -

17

Page 18: Report 8th

Gender Varchar 5 -

Dob Varchar 10 -

Address Varchar 50 -

Pass Varchar 9 -

Table Name: Vote

Fieldname Data Type Length Key

Voterid Varchar 15 Primary Key

Name Varchar 15 -

Pname Varchar 15 -

18

Page 19: Report 8th

CHAPTER 4

SYNOPSIS

(Deptt. of CSE & IT)

Details of the students Date: 04/05/2014

University Roll no. Name of Student

01410103009 Shristy Priya

Semester: 8th Semester

Branch: Computer Science and Engineering.

Project Guide’s Name: Ms. Jyoti choudhary.

4.1 Implementation Details

Project Title: ONLINE VOTING SYSTEM

Abstract:

This report provides a complete description of all the functions and specifications of

the ONLINE VOTING SYSTEM. This project is aimed at developing a web based

application. In this the citizen are allowed to cast their vote through online without

going to anywhere.

Scope, Applications and Need:

Need:

Provision of improved voting services to the voters through fast, timely and

convenient voting Reduction of the costs incurred by the Electoral Commission

19

Page 20: Report 8th

during voting time in paying the clerks employed for the sake of the success of the

manual system. Check to ensure that the members who are registered are the only

ones to caste the vote. Online voting system will being very cost cutting to produce an

effective election management system. It is easier to independently moderate the

elections and subsequently reinforce its transparency and fairness. Less capital, less

effort and less labor intensive, as the primary cost and effort will focus primarily on

creating, managing, and running a secure online portal.

Application:

It is based on html and php which make it very attractive.

4.2 Problems Faced in the current System

The following problems are faced in the current system, they are

1. Expensive and Time consuming.

2. Errors during data entry.

3. Loss of registration forms

4. Short time provided to view the voter register.

Keywords

Generic Technology keyword

Databases, html, and php.

Specific Technology keywords

MS-SQL server, and wamp server

20

Page 21: Report 8th

4.3 Functional components of the project

Following is a list of functionalities of the system. More functionality that you find

appropriate can be added to this list. And, in places the description of functionality is

not adequate; you can make appropriate assumptions and proceed.

1. Citizen can cast their vote easily.

2. Citizen can vote their party without going to anywhere.

3. Time consuming for user.

4. Admin see the poll results.

5. New citizen can easily registered themselves to cast their vote.

4.4 Steps to start-off the project

1. User must have a system.

2. User must have an installed a web browser to access web application.

3. Open the browser.

4. Enter the website name in URL.

5. Enter your voter id to vote the desired party if you are already registered.

6. If you are not registered then you can do to login button to fill the required details.

7. After completing the required information you are allow submit a form.

8. Now enter your voter id and password.

9. Click on ‘Login’ button.

10. In few seconds, the login page will be opened in which you are able to select the

party name to whom to want to cast your vote

11. Click on “Submit” button

12. After this your vote has been stored in database.

13. Admin can also check the result if they want to see the result.

21

Page 22: Report 8th

4.3 Existing Pattern Vs New Pattern

Our existing pattern was based on old file system so we tried to make this system

advanced and powerful. Previous pattern based on file system so all the data are

stored in the form of paper, files etc. So in our applications we put all that work into a

client/server application. All data are stored in the server side so in case of any loss of

data we can regenerate it from the server. All data are updated in case of any change

of information by the users. The use of good templates, css and programming make

the application attractive.

4.4 Requirements

Hardware requirements

Number Description Alternatives (If available)

1 PC with 2 GB hard-disk

and 256 MB RAM

Not-Applicable

Software requirements

Number Description Alternatives (If available)

1 Windows 95/98/XP/7/8 Not Applicable

2 MS-SQL server Not Applicable

3 Browser(any) Not Applicable

22

Page 23: Report 8th

Guide’s Comments

S. no. Details (Yes/No)

01 Whether the Project decided by the students can be completed

within this semester or not.

02 Whether the Project decided by the students is worth

awarding B. Tech degree or not.

Milestones and Timelines

Number Milestone Name Milestone

Description

Timeline

Week no.

from the

start

of the project

Remarks

1 Requirements

Specification

Complete

specification of

the system (with

appropriate

assumptions)

including the

facilities that

would be

supported, the

services in each

facility that

1-2 Attempt should

be made to add

some more

relevant

functionalities

other than those

that are listed in

this document.

23

Page 24: Report 8th

would be

supported,

selection of

facility-heads,

assignees and

administrator

constitutes this

milestone. A

document

detailing the

same should be

written and a

presentation on

that be made.

Attempt should

be made to

clearly

formulate the

work-flow of

each of the

services (for

example, who

will take care of

replacing a

faulty bulb in

the lab, who

will take care of

ordering a new

book/magazine

for the college

library etc)

2 Technology

familiarization

Understanding

of the

technology

needed to

implement the

project.

3-4 The

presentation

should be from

the point of

view of being

able to apply it

to the project,

rather than from

a theoretical

perspective.

3 High-level and

Detailed Design

Listing down all

possible

5-7 The scenarios

should map to

24

Page 25: Report 8th

scenarios (like

request creation,

request

assignment,

status updation

on a request etc)

and then coming

up with flow-

charts or

pseudocode to

handle the

scenario.

the requirement

specification (ie,

for each

requirement that

is specified, a

corresponding

scenario should

be there).

4 Implementation of

the front-end of the

system

Implementation

of the main

screen giving

the login, screen

that follows the

login giving

various options,

screens for

facility-heads,

screens for the

administrator

functions etc.

7-10 During this

milestone

period, it would

be a good idea

for the team (or

one person from

the team) to

start working on

a test-plan for

the entire

system. This

test-plan can be

updated as and

when new

scenarios come

to mind.

25

Page 26: Report 8th

5 Integrating the

front-end with the

database

The front-end

developed in the

earlier milestone

will now be able

to update the

facilities

database. Other

features like

mail notification

etc should be

functional at this

stage. In short,

the system

should be ready

for integration

testing.

11-13

6 Integration Testing The system

should be

thoroughly

tested by

running all the

testcases written

for the system

(from milestone

5).

14-15 Another 2

weeks should be

there to handle

any issues found

during testing of

the system.

After that, the

final demo can

be arranged.

7 Final Review Issues found

during the

previous

milestone are

16-18 During the final

review of the

project, it

should be

26

Page 27: Report 8th

fixed and the

system is ready

for the final

review.

checked that all

the

requirements

specified during

milestone

number 1 are

fulfilled (or

appropriate

reasons given

for not fulfilling

the same)

Guidelines and References

http://w3schools.com

en.wikipedia.org/wki/online voting system

http://www.functionx.com/sqlserver/ (SQL-server tutorial)

27

Page 28: Report 8th

CHAPTER 5

SOFTWARE TESTING

5.1 Testing

Software testing is done to check or test the software application in all aspects after

testing the software in all the phases and when the software fulfils all the requirement

specifications and completely tested and verified by the testing team than the software

is forwarded to the market and in this way the software application is uses by the

users for organizational or personal purpose. This whole process is known as testing.

Software testing can be stated as the process of validating and verifying that a

computer program/application/product: meets the requirements that guided its design

and development, works as expected, can be implemented with the same

characteristics, and satisfies the needs of stakeholders.

Software testing, depending on the testing method employed, can be implemented at

any time in the software development process. Traditionally most of the test effort

occurs after the requirements have been defined and the coding process has been

completed, but in the Agile approaches most of the test effort is on-going. As such,

the methodology of the test is governed by the chosen software development

methodology.

Testing can never completely identify all the defects within software. Instead, it

furnishes a criticism or comparison that compares the state and behavior of the

product against oracles principles or mechanisms by which someone might recognize

a problem. These oracles may include specifications, contracts, comparable products,

past versions of the same product, inferences about intended or expected purpose,

user or customer expectations, relevant standards, applicable laws, or other criteria.

28

Page 29: Report 8th

A primary purpose of testing is to detect software failures so that defects may be

discovered and corrected. Testing cannot establish that a product functions properly

under all conditions but can only establish that it does not function properly under

specific conditions. The scope of software testing often includes examination of code

as well as execution of that code in various environments and conditions as well as

examining the aspects of code: does it do what it is supposed to do and do what it

needs to do. In the current culture of software development, a testing organization

may be separate from the development team. There are various roles for testing team

members. Information derived from software testing may be used to correct the

process by which software is developed.

Every software product has a target audience. For example, the audience for video

game software is completely different from banking software. Therefore, when an

organization develops or otherwise invests in a software product, it can assess

whether the software product will be acceptable to its end users, its target audience,

its purchasers and other stakeholders. It is the process of attempting to make this

assessment

5.2 Types of Testing

1. Black box testing – Internal system design is not considered in this type of testing.

Tests are based on requirements and functionality.

2. White box testing – This testing is based on knowledge of the internal logic of an

application’s code. Also known as Glass box Testing. Internal software and code

working should be known for this type of testing. Tests are based on coverage of code

statements, branches, paths, conditions.

3 Unit testing – Testing of individual software components or modules. Typically it

is done by the programmer and not by testers, as it requires detailed knowledge of the

internal program design and code may require developing test drivers modules or test

harnesses.

29

Page 30: Report 8th

4 Incremental Integration Testing – Bottom up approach for testing i.e continuous

testing of an application as new functionality is added; Application functionality and

modules should be independent enough to test separately done by programmers or by

testers.

5 Integration Testing – Testing of integrated modules to verify combined

functionality after integration. Modules are typically code modules, individual

applications, client and server applications on a network, etc. This type of testing is

especially relevant to client/server and distributed systems.

6 Functional testing – This type of testing ignores the internal parts and focus on the

output is as per requirement or not. Black-box type testing geared to functional

requirements of an application.

7 System testing – Entire system is tested as per the requirements. Black-box type

testing that is based on overall requirements specifications, covers all combined parts

of a system.

8. End-to-end testing – Similar to system testing, involves testing of a complete

application environment in a situation that mimics real-world use, such as interacting

with a database, using network communications, or interacting with other hardware,

applications, or systems if appropriate.

9. Sanity Testing - Testing to determine if a new software version is performing well

enough to accept it for a major testing effort. If application is crashing for initial use

then system is not stable enough for further testing and build or application is

assigned to fix.

10. Regression testing – Testing the application as a whole for the modification in

any module or functionality. It is difficult to cover all the system in regression testing

so typically automation tools are used for these testing types.

30

Page 31: Report 8th

11. Acceptance testing -Normally this type of testing is done to verify if system

meets the customer specified requirements. User or customer do this testing to

determine whether to accept application.

12. Load testing – It’s a performance testing to check system behavior under load.

Testing an application under heavy loads, such as testing of a web site under a range

of loads to determine at what point the system’s response time degrades or fails.

13. Stress testing – System is stressed beyond its specifications to check how and

when it fails. It is performed under heavy load like putting large number beyond

storage capacity, complex database queries, continuous input to system or database

load.

14. Performance testing – Term often used interchangeably with ‘stress’ and ‘load’

testing. To check whether system meets performance requirement, used different

performance and load tools to do this.

15. Usability testing – User-friendliness check. Application flow is tested, Can new

user understand the application easily, Proper help documented whenever user stuck

at any point. Basically system navigation is checked in this testing.

16. Install/uninstall testing - Tested for full, partial, or upgrade install/uninstall

processes on different operating systems under different hardware, software

environment.

17. Recovery testing – Testing how well a system recovers from crashes, hardware

failures, or other catastrophic problems.

18. Security testing – Can system be penetrated by any hacking way, Testing how

well the system protects against unauthorized internal or external access. It is checked

if system, database is safe from external attacks.

31

Page 32: Report 8th

19. Compatibility testing – Testing how well software performs in a particular

hardware/software/operating system/network environment and different combinations

of above.

20. Comparison testing – Comparison of product strengths and weaknesses with

previous versions or other similar products.

21. Alpha testing – In house virtual user environment can be created for this type of

testing. Testing is done at the end of development. Still minor design changes may be

made as a result of such testing.

22. Beta testing – Testing typically done by end-users or others. Finally, the testing

before releasing application for commercial purpose.

23. Glass box testing- Glass box testing is the same as white box testing. It is a

testing approach that examines the application's program structure, and derives test

cases.

24. Open box testing- Open box testing is same as white box testing. It is a testing

approach that examines the application's program structure, and derives test cases.

25. Black box testing- Black box testing a type of testing that considers only

externally visible behaviour. Black box testing considers neither the code itself, nor

the "inner workings" of the software. You CAN learn to do black box testing, with

little or no outside help.

26. Unit testing- Unit testing is the first level of dynamic testing and is first the

responsibility of developers and then that of the test engineers. Unit testing is

performed after the expected test results are met or differences are explainable/

acceptable.

32

Page 33: Report 8th

CHAPTER 6

CODING

6.1 Client side code

6.1.1. Give.html

<html>

<body>

<form method="POST" action="give.php">

<center>

<table>

<tr>

<td>Enter your voter_id</td><td> <input type="textname="t1"></td>

</tr>

<tr>

<td>Enter your name</td><td> <input type="text" name="t2"</td>

</tr>

<tr>

<td>Select your party</td><td> <select name="t3"> <optionvalue=select>select

<option value=Congress>Congress

<option value=BJP>BJP

33

Page 34: Report 8th

<option value=BSP>BS

<option value=SP>SP

<option value=TMC>TMC

<option value=AAP>AAP

</select>

</td>

</tr>

<tr><td><input type="submit"value="Submit"</td>

</tr>

</center>

</table>

</form>

</body>

</html>

6.1.2. Give.php

<?php

$a=$_REQUEST['t1'];

$b=$_REQUEST['t2'];

$c=$_REQUEST['t3'];

34

Page 35: Report 8th

$con=mysql_connect("localhost","root");

$db=mysql_select_db("votesce",$con);

$query=mysql_query("insert into vote(voterid,name,pname)values('$a','$b','$c')");

echo "<center><b><font size=10 color=green face=forte>Thanks for

voting</font></b></center>";

mysql_close($con);

?>

6.1.3. head.html

<html>

<body background="image/1.jpg">

<center>

<font size=10 ><b>VOTE_4_INDIA</b></font>

</center>

</body>

</html>

6.1.4. Left.html

<html>

<body bgcolor=orange>

<table>

<tr>

35

Page 36: Report 8th

<td><img src="image/bjp.jpg" height=150 width=250></td>

</tr>

<tr>

<td><img src="image/congress.jpg" height=150 width=250></td>

</tr>

<tr>

<td><img src="image/app.jpg" height=150 width=250></td>

</tr>

</table>

</body>

</html>

6.1.5. Login.html

<html>

<head>

<title>www.vote_4_india.com</title>

</head>

<frameset rows="20%,*" frame border="no">

<frame src="head.html " name="frame1">

<frameset cols="20%,60%,20%">

36

Page 37: Report 8th

<frame src="left.html " name="frame1">

<frame src="main.html " name="frame1">

<frame src="right.html " name="frame1">

</frameset>

</frameset>

</html>

6.1.6. Main.html

<html>

<body>

<form method="POST" action="vote.php ">

<center>

<table>

<tr>

<td><marquee><img src="image/m1.jpg" height=100 width=100><img

src="image/m2.jpg" height=100 width=100><img src="image/m3.jpg" height=100

width=100></marquee></td>

</tr>

<tr>

<td>Voter_id</td><td><input type="text" name="t1"></td>

</tr>

37

Page 38: Report 8th

<tr>

<td>Password</td><td><input type="password" name="t2"></td>

</tr>

<tr>

<td><input type="submit" value="Login"></td><td><a href="sing.html"><input

type="button" value="Sing_up"></a></td>

</tr>

<tr>

<td><marquee><img src="image/m4.jpg" height=100 width=100><img

src="image/m5.jpg" height=100 width=100><img src="image/m6.jpg" height=100

width=100></marquee></td>

</tr>

</center>

</table>

</form>

</body>

</html>

6.1.7. Right.html

<html>

<body bgcolor=green>

38

Page 39: Report 8th

<table>

<tr>

<td><img src="image/sp.gif" height=150 width=250></td>

</tr>

<tr>

<td><img src="image/tmc.jpg" height=150 width=250></td>

</tr>

<tr>

<td><img src="image/bsp.jpg" height=150 width=250></td>

</tr>

</table>

</body>

</html>

6.1.8. Sign.html

<html>

<body>

<form method="POST" action="sing.php">

<table>

<tr>

39

Page 40: Report 8th

<td>Enter your Voter_id :</td><td><input type="text" name="t1"></td>

</tr>

<tr>

<td>Enter your Name :</td><td><input type="text" name="t2"></td>

</tr>

<tr>

<td>Enter your Father/Husband name :</td><td><input type="text"

name="t3"></td>

</tr>

<tr>

<td>Enter your Gender :</td><td><input type="text" name="t4"></td>

</tr>

<tr>

<td>Enter your Date of birth :</td><td><input type="date" name="t5"></td>

</tr>

<tr>

<td>Enter your Address :</td><td><textarea rows=5 cols=40

name="t6"></textarea></td>

</tr>

<tr>

40

Page 41: Report 8th

<td>Enter your Password :</td><td><input type="password" name="t7"></td>

</tr>

<tr>

<td><input type="submit" value="Submit"</td><td><input type="reset"

value="Reset"</td>

</tr>

</table>

</form>

</body>

</html>

6.1.9. Sign.php

<?php

$a=$_REQUEST['t1'];

$b=$_REQUEST['t2'];

$c=$_REQUEST['t3'];

$d=$_REQUEST['t4'];

$e=$_REQUEST['t5'];

$f=$_REQUEST['t6'];

$g=$_REQUEST['t7'];

$con=mysql_connect("localhost","root");

41

Page 42: Report 8th

$db=mysql_select_db("votesce",$con);

$query=mysql_query("insert into

sing(voterid,name,fhname,gender,dob,address,pass)values('$a','$b','$c','$d','$e','$f','$g'

)");

echo"<center><b><font size=10 color=blue face=forte><a href=main.html>You are

regeistered</a></font></b></center> ";

mysql_close($con);

?>

6.1.10. Vote.php

<?php

$con = mysql_connect("localhost","root");

$db=mysql_select_db("votesce", $con);

$x=$_REQUEST['t1'];

$y=$_REQUEST['t2'];

$result = mysql_query("SELECT * FROM sing where voterid='$x' AND pass='$y'");

setcookie("user", "$x", time()+3600);

if($row = mysql_fetch_array($result))

{

header("Refresh: 0;url=give.html");

42

Page 43: Report 8th

}

else

{

echo" Invalid voter_id OR password";

}

mysql_close($con);

?>

6.2 Admin side code

6.2.1. Admin.php

<?php

$a=$_REQUEST['t1'];

$b=$_REQUEST['t2'];

$con = mysql_connect("localhost","root");

$db=mysql_select_db("votesce", $con);

$result = mysql_query("SELECT * FROM admin where uname='$a' AND

pass='$b'");

setcookie("user", "$a", time()+3600);

if($row = mysql_fetch_array($result))

{

43

Page 44: Report 8th

header("Refresh: 0;url=result.php");

}

else

{

echo" Invalid voter_id OR password";

}

mysql_close($con);

6.2.2.head.html

<html>

<body background="image/1.jpg">

<center>

<font size=10 ><b>VOTE_4_INDIA</b></font>

</center>

</body>

</html>

6.2.3 Left.html

<html>

<body bgcolor=orange>

<table>

44

Page 45: Report 8th

<tr>

<td><img src="image/bjp.jpg" height=150 width=250></td>

</tr>

<tr>

<td><img src="image/congress.jpg" height=150 width=250></td>

</tr>

<tr>

<td><img src="image/app.jpg" height=150 width=250></td>

</tr>

</table>

</body>

</html>

6.2.4.Login.html

<html>

<head>

<title>www.vote_4_india.com</title>

</head>

<frameset rows="20%,*" frame border="no">

<frame src="head.html " name="frame1">

45

Page 46: Report 8th

<frameset cols="20%,60%,20%">

<frame src="left.html " name="frame1">

<frame src="main.html " name="frame1">

<frame src="right.html " name="frame1">

</frameset>

</frameset>

</html>

6.2.5. Main.html

<html>

<body>

<form method="POST" action="admin.php ">

<center>

<table>

<tr>

<td><marquee><img src="image/m1.jpg" height=100 width=100><img

src="image/m2.jpg" height=100 width=100><img src="image/m3.jpg" height=100

width=100></marquee></td>

</tr>

<tr>

<td>User_Name</td><td><input type="text" name="t1"></td>

46

Page 47: Report 8th

</tr>

<tr>

<td>Password</td><td><input type="password" name="t2"></td>

</tr>

<tr>

<td><input type="submit" value="Login"></td>

</tr>

<tr>

<td><marquee><img src="image/m4.jpg" height=100 width=100><img

src="image/m5.jpg" height=100 width=100><img src="image/m6.jpg" height=100

width=100></marquee></td>

</tr>

</center>

</table>

</form>

</body>

</html>

47

Page 48: Report 8th

6.2.6. Result.php

<?php

$con=mysql_connect("localhost","root");

$db=mysql_select_db("votesce",$con);

$query=mysql_query("select* from vote");

Print "<table border cellpadding=3>";

while($info = mysql_fetch_array( $query ))

{

Print "<tr>";

Print "<th>voterid:</th> <td>".$info['voterid'] ."</td> ";

Print "<th>Name:</th> <td>".$info['name'] ." </td>";

Print "<th>PartyName:</th> <td>".$info['pname'] . " </td>

</tr>";

}

Print "</table>";

echo"<table border='1' style='border-collapse: collapse;border-color:silver,'>";

echo"<tr style='font-weight:bold;'>";

echo"<td width='100'align='center'>PARTY NAME</td>";

$result=mysql_query("SELECT pname,COUNT(DISTINCT(voterid))

48

Page 49: Report 8th

FROM vote GROUP BY pname");

while($row=mysql_fetch_array($result))

{

echo "<tr>";

echo "<td align='center' width='200'>".$row['pname']."</td>";

echo "<td align='center' width='200'>".$row['COUNT(DISTINCT(voterid))']."</td>";

echo "</tr>";

}

echo "</table>";

mysql_close($con);

?>

6.2.7 Result.html

<html>

<body bgcolor=green>

<table>

<tr>

<td><img src="image/sp.gif" height=150 width=250></td>

</tr>

<tr>

49

Page 50: Report 8th

<td><img src="image/tmc.jpg" height=150 width=250></td>

</tr>

<tr>

<td><img src="image/bsp.jpg" height=150 width=250></td>

</tr>

</table>

</body>

</html>

50

Page 51: Report 8th

6.3 Snapshots

6.3.1 Login Page

51

Page 52: Report 8th

6.3.2 Sign up page

52

Page 53: Report 8th

6.3.3 Admin Page

53

Page 54: Report 8th

6.3.4 Number of votes and result

54

Page 55: Report 8th

CHAPTER 7

CONCLUSION

The project titled as “Online voting system” is a web based application. This software

provides facility for reporting online vote, sign up, and result can only be seen by the

admin. This software is developed with scalability in mind. Additional modules can

be easily added when necessary. The software is developed with modular approach.

All modules in the system have been tested with valid data and invalid data and

everything work successfully. Thus the system has fulfilled all the objectives

identified and is able to replace the existing system.

The project has been completed successfully with the maximum satisfaction of the

organization. The constraints are met and overcome successfully. The system is

designed as like it was decided in the design phase. The project gives good idea on

developing a full-fledged application satisfying the user requirements.

The system is very flexible and versatile. This software has a user-friendly screen

that enables the user to use without any inconvenience. Validation checks induced

have greatly reduced errors. Provisions have been made to upgrade the software. The

application has been tested with live data and has provided a successful result. Hence

the software has proved to work efficiently.

55

Page 56: Report 8th

CHAPTER 8

SCOPE FOR FUTURE ENHANCEMENT

Using database more over High speed, accuracy and non-redundant data are the main

advantages of the proposed system. In the proposed system the user is provided with

a choice of data screen, which are similar in formats to the source documents. Data

entry errors can be minimized through validity checks. After the verification only the

data are placed the permanent database. The software can be developed further to

include a lot of modules because the proposed system is developed on the view of

future, for example we should develop the system as a database independent using

JDBC so we can connect it to any other database, Now the proposed system is based

on PC and intranet but in the future if we need to convert it into internet then we need

to change the front end only because we are developing this on the basis of OOP

technology and most of the business logic’s are bounded in the class files and module

like reusable components.

56

Page 57: Report 8th

References

http://w3schools.com

en.wikipedia.org/wki/online voting system

http://www.functionx.com/sqlserver/ (SQL-server tutorial)

57