Anda di halaman 1dari 57

1

CHAPTER 1
INTRODUCTION

1.1 Online Voting System
Online voting system is an online voting technique. In this system who have
citizenship of India and whose age is above 18 years of age and any gender can give
his\her vote online without going to any physical polling station.
There is a database which is maintained in which all the names of voters and there
unique voter id with complete information is stored.
In Online voting system a voter can use his\her voting online without any difficulty,
All they need is to registered themselves to caste to vote. Registration is mainly done
by the administrator for security reasons. The administrator registers the voters on a
client site of the system. Citizens seeking registration are expected to submit their
details.
After the validity of them being citizens of India has been confirmed by the
administrator by comparing their details submitted with those in existing database
such as those as the Registration of Person, the citizen is then registered as a voter.
After registration, the voter can use to login into the system to vote with the help of
their vote id no. if the invalid or wrong details are submitted, then the citizen is not
allowed to caste there vote.
It is a electronic way to choose a leader via a web based application. The unique part
of the online voting system is that the voter have the choice of voting at there own
free time ,so it is more time efficient and convenient for the voter to caste the vote.


2

1.2 Background
The online voting system is also known as e-voting is a term encompassing several
different types of voting embracing both electronic means of counting voters. It can
involve transmission of ballots and votes via telephones, private computer network.
Online voting is an electronic way of choosing leaders by a web based application.
The advantages of online voting over the common queue method is that the voters
have the choice of voting at their own free time and there is reduced congestion. It
also minimizes on errors of vote counting. The individual votes are submitted in a
database which can be queried to find out who of the aspirants for a given post has
the highest number of votes.
With the online voting system a voter can use his\her voting right online without any
difficulty. He\she has to register as a voter first before being authorized to vote.
However, nor just anybody can vote, for one to participate in elections, he\she must
have the requirements. Initially he\she must be a registered citizen that is must be 18
and aboveyears old. As already mentioned that the online voting system is limited
only to registered voters.
Online voting system are appealing for several reasons which include, people are
getting more used to work with computers to do all sorts of things.
1.3 Need Of Online Voting System
The need of the online voting system include:
1. Provision of improved voting services to the voters through fast, timely and
convenient voting
2. Increased number of voters as individual will find it easier and more convenient to
vote, especially those abroad
3

3. Reduction of the costs incurred by the Electoral Commission during voting time in
paying the clerks employed for the sake of the success of the manual system
4. Check to ensure that the members who are registered are the only ones to caste the
vote.
5. Online voting system will being very cost cutting to produce an effective election
management system.
6. It is easier to independently moderate the elections and subsequently reinforce its
transparency and fairness.
7. Less capital, less effort and less labor intensive, as the primary cost and effort will
focus primarily on creating, managing, and running a secure online portal.
1.4 Importance Of Online Voting System
The online voting system use to reduce the time spend making long queues at the
polling stations during voting. It shall also enable the voters to vote from nay part of
the globe as explained since this is an online application available on the internet.
cases of vote miscounts shall also be solved since at the backend of this system
resides a well developed databases using my sql that can provide the correct data
once its correctly queried. Since the voting process shall be open as early as possible
the voters, shall have ample time to decide when and whom to vote for.

1.5 Security Issue of Online Voting System
The origin of the security issues was due to not only the outsider but also inside ,even
just because of the inheritance of some objects in the source code are unsuitable.
These errors caused the voting system to crash. So we can design our systems to
transmit data without networking. Its also use to limit voter input particular data, so
that we can prevent the command injection from running.
4

We recommend only using the two groups in this and they are client side and
admin side.
Client side include
1. Voter_id
2. Password
3. Voter Name
4. Party Name
Administration side include
1 User Name
2 Password
VOTER_ID : Voter ID card or Electors Photo Identity Card. It is an identification
card issued by the Election Commission to all eligible voters, to enable voter
identification on Election Day. All those who are already enrolled in the voter list are
eligible to receive a voter ID card. It is very important for the citizen to have there
voter_id card, as it help us you ti cast the vote to your desirable candidate party. Its
act as an identity proof on that day.

PASSWORD OF VOTER: A password is basically a secret word or phrase known
only to a restricted people. It is known by the user only.

VOTER NAME: It is the name of the citizen who is allowed to caste the vote after
being registered. Every citizen is assigned with the unique voter id with the election
commission.

PARTY NAME: It consist of the name of the party which are going to stand for the
election. There are many different party in India such as Congress, BJP, APP, BSP,
SP, TCM. Citizen needs to select the candidate from the desire party they want to
choice.
5


USER NAME: There is only one user in admin who is allowed to see the result of
the vote. It is basically done for the sake of the security purpose.

PASSWOPRD OF USER: The password of the user should be known to him only.
No one else should know the password of the user.
In this we also use the two buttons and they are LOGIN button and SUBMIT button.
The role of the LOGIN button is to allow the voter to cast their vote once they
registered themselves, and the SUBMIT button is to allow the new user to registered
themselves if they are not registered with the required details in the form in which
they have to enter their voter id. Those who have the voter id are only to allow to
continue the process of the form, then after that they need to fill their personal details
like your Name, Father name, Gender, Date of birth, Address and at the last
Password.











6

CHAPTER 2
SYSTEM ANALYSIS
After investigation it is essential to determine whether the project is feasible or not. In
feasibility study is tested whether the system to be developed would be able to
accomplish its task on the working ground. It impact was also found to be not
adverse. It was found that the users requirements would be met and resources would
be used in an effective manner.
2.1 Feasibility Study
After investigation it is essential to determine whether the project is feasible or not.
In feasibility study is tested whether the system to be developed would be able to
accomplish its task on the working ground. It impact was also found to be not
adverse. It was found that the users requirements would be met and resources would
be used in an effective manner. In feasibility study the important aspects related to the
project were considered like the problem definition and the process for solution. The
cost and benefit analysis was also done.
2.2 Feasibility considerations
To do a feasibility study, the economic, technical, and behavioral factors in the
system developed were considered.
The three key considerations were as follows:
Economic Feasibility
The project ONLINE VOTING SYSTEM was within budget and producing the
desire results. The labor or the human were considered of two group members of the
project.


7

Technical Feasibility
Technical Feasibility revolves around the technical support of the project. The main
infrastructure of the project included the project labs in the college campus. The
systems there were easily able to absorb the new software being installed. The project
thus was technically feasible. The equipment and the software produced no problem.
The projects technical requirements were met. The project could be made to work
correctly, fulfilling its task, with the existing software and personnel.
2.3 Operational Feasibility
2.3.1 System Requirement
System Requirement are the minimum requirement that are needed to run the
software.
2.3.2 Hardware Requirement
1.Processor: Anyone
2.keyboard: Mouse
3.Display: Device
2.3.3 Software Requirement
1. wamp sever
2. html
3. Browser
4. mysql



8

2.4 Software Description
The detailed description is as follow-
2.4.1 Front End
HTML: It stands for Hyper Text Markup Language is the standard markup
language used to create web pages. It is basically use for the designing purposes.
HTML is written in the form of HTML elements consisting of tags enclosed in angle
brackets like <html>. HTML tags most commonly come in pairs
like <h1> and </h1>, although some tags represent empty elements and so are
unpaired, for example <img>. The first tag in a pair is the start tag, and the second tag
is the end tag and they are also called opening tags and closing tags
In web page designing its objective is to format the data on these pages. It uses the
tags or markups to determine how the different data contents will be displayed on a
web page. We can write the HTML code in any text editor program. Few years ago, it
was developed as a subset of SGML, where SGML stands for structured generalized
mark-up language. The SGML also is used to describe the formatting and mar-up
links and different contents of a document.
The purpose of a web browser is to read HTML documents and compose them into
visible or audible web pages. The browser does not display the HTML tags, but uses
the tags to interpret the content of the page. HTML describes the structure of a
website semantically along with cues for presentation, making it a markup
language rather than a programming language.
HTML elements form the building blocks of all websites. HTML allows images and
objects to be embedded and can be used to create interactive forms. It provides a
means to create structured documents by denoting structural semantics for text such
as headings, paragraphs, lists, links, quotes and other items. It can
embed scripts written in languages such as JavaScript which affect the behavior of
HTML web pages.
9

Web browsers can also refer to Cascading Style Sheets to define the look and layout
of text and other material. TheW3C, maintainer of both the HTML and the CSS
standards, encourages the use of CSS over explicit presentational HTML. It also
consists of several key components, including tags and their attributes, character-
based data types. Another important component is the document type declaration,
which triggers standards mode rendering.
HTML is important as the base language that css, and php plug in to. It provides the
content that css styles, and php links to a database to simplify their functions.
It is the best language for website creation. It has several benefits a number of
them are:

1. A significant benefit of HTML it is free of charge and no need to install any
software.
2. HTML is simple to use and understand. and high speed loading time.
3. Most development tools whatever they are paid or free all support HTML.
4. HTML and XML syntax is extremely similar.

PHP: It is a server-side scripting language designed for web development but also
used as a general-purpose programming language.
PHP code is interpreted by a web server with a PHP processor module, which
generates the resulting web page: PHP commands can be embedded directly into
an HTML source document rather than calling an external file to process data. It has
also evolved to include a command-line interface capability and can be used
in standalone graphical applications.
PHP is free software released under the PHP License. PHP has been widely ported
and can be deployed on most web servers on almost every operating
system and platform, free of charge.
10

The PHP interpreter only executes PHP code within its delimiters. Anything outside
its delimiters is not processed by PHP. The most common delimiters are <?php to
open and ?> to close PHP sections. <script language= "php"> and </script> delimiters
are also available, as are the shortened forms <?.

Variables are prefixed with a dollar symbol, and a type does not need to be specified
in advance. Unlike function and class names, variable names are case sensitive. Both
double-quoted ("") and strings provide the ability to interpolate a variable's value into
the string. PHP treats newlines as whitespace in the manner of a free-form language
and statements are terminated by a semicolon. It has three types of comment
syntax: /* */ marks block and inline comments; // as well as # are used for one-line
comments. The echo statement is one of several facilities PHP provides to output
text, e.g., to a web browser.
In terms of keywords and language syntax, PHP is similar to most high level
languages that follow the C style syntax. if conditions, for and while loops, and
function returns are similar in syntax to languages such as C, C++, C#, Java and Perl.
It stores whole numbers in a platform-dependent range, either a 64-bit or 32-
bit signed integer equivalent to the C-language long type. Unsigned integers are
cconverted to signed values in certain situations; this behavior is different from other
programming languages. Integer variables can be assigned using decimal positive and
negative, octal, hexadecimal, and binary notations.
Arrays can contain elements of any type that PHP can handle, including resources,
objects, and even other arrays. Order is preserved in lists of values and in hashes with
both keys and values, and the two can be intermingled. PHP also supports strings,
which can be used with single quotes, double quotes.
PHP has hundreds of functions provided by the core language functionality and
thousands more available via various extensions; these functions are well documented
in the online PHP documentation.
11

It is a general-purpose scripting language that is especially suited to server-side web
development where it generally runs on a web server. Any PHP code in a requested
file is executed by the PHP runtime, usually to create dynamic web page content. It
can also be used for command-line scripting and client-side graphical user
interface GUI applications. PHP can be deployed on most web servers,
many operating systems and platforms, and can be used with many relational
database management systems RDBMS. Most web hosting providers support PHP for
use by their clients. It is available free of charge, and the PHP Group provides the
complete source code for users to build, customize and extend for their own use.
[9]

PHP acts primarily as a filter, taking input from a file or stream containing text and its
instructions and outputting another stream of data. Most commonly the output will be
HTML.
Originally designed to create dynamic web pages, PHP focuses mainly on server-side
scripting, and it is similar to other server-side scripting languages that provide
dynamic content from a web server to a client, such. It has also attracted to the
development of many software frame works that provide building blocks.

2.4.2 Back End
SQL: It is Structured Query Language

is a special-purpose programming language
designed for managing data held in a relational database management system .
Originally based upon relational algebra , SQL consists of a data definition
language and a data manipulation language. The scope of SQL includes data insert,
query, update and delete, schema creation and modification, and data access control.
Although SQL is often described as, and to a great extent is, a declarative language, it
includes procedural elements.
SQL was one of the first commercial language, A Relational Model of Data for Large
Shared Data Banks. Despite not entirely adhering to the relational model as described
by code . It became the most widely used database language.
12

SQL became a standard of the American National Standards Institute in 1986, and of
the International Organization for Standardization in 1987. Since then, the standard
has been enhanced several times with added features. Despite these standards, code is
not completely portable among different database systems, which can lead to vendor
lock-in. The different makers do not perfectly adhere to the standard, for instance by
adding extensions, and the standard itself is sometimes ambiguous.
The SQL language is subdivided into several language elements, including:
1. Clauses: which are constituent components of statements and queries.
2. Expressions, which can produce either scalar values, or tables consisting
of columns and rows of data.
3. Predicates, which specify conditions that can be evaluated to sql or Boolean and
which are used to limit the effects of statements and queries, or to change
program flow.
4. Queries, which retrieve the data based on specific criteria. This is an important
element of SQL.










13

CHAPTER 3
SOFTWARE DESIGN
Design is the first step into the development phase for any engineered product or
system. Design is a creative process. A good design is the key to effective system.
The term design is defined as the process of applying various techniques and
principles for the purpose of defining a process or a system in sufficient detail to
permit its physical realization.

3.1 Logical Design
The logical flow of a system and define the boundaries of a system. It includes the
following steps:
1. Reviews the current physical system its data flows, file content, volumes,
Frequencies etc.
2. Prepares output specifications that is, determines the format, content and
Frequency of reports.

3.2 Physical Design
Physical system produces the working systems by define the design specifications
that tell the programmers exactly what the candidate system must do. It includes the
following steps.
1. Design the physical system.
2. Specify input and output media.
3. Design the database and specify backup procedures.



14

3.3 Input Design
The input design is the link between the information system and the user. It comprises
the developing specification and procedures for data preparation and those steps are
necessary to put transaction data in to a usable form for processing can be achieved
by inspecting the computer to read data from a written or printed document or it can
occur by having people keying the data directly into the system.
3.4 Output Design
A quality output is one, which meets the requirements of the end user and presents
the information clearly. In any system results of processing are communicated to the
users and to other system through outputs. It is the most important and direct source
information to the user. Efficient and intelligent output design improves the systems
relationship to help user decision-making.
1. Designing computer output should proceed in an organized, well thought out
manner the right output must be developed while ensuring that each output element
is designed so that people will find the system can use easily and effectively.
2. Select methods for presenting information.
3. Create document, report, or other formats that contain information produced by
the system.










15

3.5 Data Flow Diagram
Context free diagram


DFD- Administrator


party
detail

Voter Id, Password
successful
party details
list of party

voters details vote
accumulated
votes votes
vote accepted



Online Voting
System
User
Administrator
Voter_id, password

Result
User
Login

Voting
Endorsed Party
Nomination
Process

Party
Result
Electoral roll
16

Level DFD- User




vvvvvvvvvvv
Database



Database




3.6 Database Design
A database is an organized mechanism that has the capability of storing information
through which a user can retrieve stored information in an effective and efficient
manner. The data is the purpose of any database and must be protected. The database
design is a two level process. In the first step, user requirements are gathered together
and a database is designed which will meet these requirements as clearly as possible.
Voter
Registration
Process
Candidate
Registered Voter Registered Candidate
Voting
Admin
Summation of Votes
Authentication
Process
17

This step is called Information Level Design and it is taken independent of any
individual DBMS. The organization of the data in the database is aimed to achieve
the following two major objectives.
1. Data Integrity
2. Data independence

3.7 Relational Database Management System
A relational model represents the database as a collection of relations. Each relation
resembles a table of values or file of records. In formal relational model terminology,
a row is called a tuple , a column header is called an attribute and the table is called a
relation. A relational database consists of a collection of tables, each of which is
assigned a unique name. A row in a tale represents a set of related values.

3.8 Tables Structure
Table Name: Admin
Fieldname Data Type Length Key
Username Varchar 20 Primary key
Password Varchar 9 -

Table Name: Sign
Fieldname Data Type Length Key
Voter_id No Varchar 20 Primary key
Name Varchar 20 -
18

Fname Varchar 20 -
Gender Varchar 5 -
Dob Varchar 10 -
Address Varchar 50 -
Pass Varchar 9 -

Table Name: Vote
Fieldname Data Type Length Key
Voterid Varchar 15 Primary Key
Name Varchar 15 -
Pname Varchar 15 -









19

CHAPTER 4
SYNOPSIS
(Deptt. of CSE & IT)

Details of the students Date: 04/05/2014
University Roll no. Name of Student
01410103009 Shristy Priya
Semester: 8
th
Semester
Branch: Computer Science and Engineering.
Project Guides Name: Ms. Jyoti choudhary.

4.1 Implementation Details
Project Title: ONLINE VOTING SYSTEM
Abstract:
This report provides a complete description of all the functions and specifications of
the ONLINE VOTING SYSTEM. This project is aimed at developing a web based
application. In this the citizen are allowed to cast their vote through online without
going to anywhere.
Scope, Applications and Need:
Need:
Provision of improved voting services to the voters through fast, timely and
convenient voting Reduction of the costs incurred by the Electoral Commission
20

during voting time in paying the clerks employed for the sake of the success of the
manual system. Check to ensure that the members who are registered are the only
ones to caste the vote. Online voting system will being very cost cutting to produce an
effective election management system. It is easier to independently moderate the
elections and subsequently reinforce its transparency and fairness. Less capital, less
effort and less labor intensive, as the primary cost and effort will focus primarily on
creating, managing, and running a secure online portal.
Application:
It is based on html and php which make it very attractive.
4.2 Problems Faced in the current System
The following problems are faced in the current system, they are
1. Expensive and Time consuming.
2. Errors during data entry.
3. Loss of registration forms
4. Short time provided to view the voter register.
Keywords
Generic Technology keyword
Databases, html, and php.
Specific Technology keywords
MS-SQL server, and wamp server



21

4.3 Functional components of the project
Following is a list of functionalities of the system. More functionality that you find
appropriate can be added to this list. And, in places the description of functionality is
not adequate; you can make appropriate assumptions and proceed.
1. Citizen can cast their vote easily.
2. Citizen can vote their party without going to anywhere.
3. Time consuming for user.
4. Admin see the poll results.
5. New citizen can easily registered themselves to cast their vote.

4.4 Steps to start-off the project
1. User must have a system.
2. User must have an installed a web browser to access web application.
3. Open the browser.
4. Enter the website name in URL.
5. Enter your voter id to vote the desired party if you are already registered.
6. If you are not registered then you can do to login button to fill the required details.
7. After completing the required information you are allow submit a form.
8. Now enter your voter id and password.
9. Click on Login button.
10. In few seconds, the login page will be opened in which you are able to select the
party name to whom to want to cast your vote
11. Click on Submit button
12. After this your vote has been stored in database.
13. Admin can also check the result if they want to see the result.


22

4.3 Existing Pattern Vs New Pattern
Our existing pattern was based on old file system so we tried to make this system
advanced and powerful. Previous pattern based on file system so all the data are
stored in the form of paper, files etc. So in our applications we put all that work into a
client/server application. All data are stored in the server side so in case of any loss of
data we can regenerate it from the server. All data are updated in case of any change
of information by the users. The use of good templates, css and programming make
the application attractive.
4.4 Requirements
Hardware requirements
Number Description Alternatives (If available)
1 PC with 2 GB hard-disk
and 256 MB RAM
Not-Applicable

Software requirements
Number Description Alternatives (If available)
1 Windows 95/98/XP/7/8 Not Applicable
2 MS-SQL server Not Applicable
3 Browser(any) Not Applicable




23

Guides Comments
S. no. Details (Yes/No)
01 Whether the Project decided by the students can be completed
within this semester or not.

02 Whether the Project decided by the students is worth
awarding B. Tech degree or not.



Milestones and Timelines
Number Milestone Name Milestone
Description
Timeline
Week no.
from the
start
of the project
Remarks
1 Requirements
Specification
Complete
specification of
the system (with
appropriate
assumptions)
including the
facilities that
would be
supported, the
services in each
1-2 Attempt should
be made to add
some more
relevant
functionalities
other than those
that are listed in
this document.

24

facility that
would be
supported,
selection of
facility-heads,
assignees and
administrator
constitutes this
milestone. A
document
detailing the
same should be
written and a
presentation on
that be made.
Attempt should
be made to
clearly
formulate the
work-flow of
each of the
services (for
example, who
will take care of
replacing a
faulty bulb in
the lab, who
will take care of
ordering a new
book/magazine
for the college
library etc)
2 Technology
familiarization
Understanding
of the
technology
needed to
implement the
project.
3-4 The
presentation
should be from
the point of
view of being
able to apply it
to the project,
rather than from
a theoretical
perspective.
3 High-level and Listing down all
possible
5-7 The scenarios
should map to
25

Detailed Design scenarios (like
request creation,
request
assignment,
status updation
on a request etc)
and then coming
up with flow-
charts or
pseudocode to
handle the
scenario.
the requirement
specification (ie,
for each
requirement that
is specified, a
corresponding
scenario should
be there).
4 Implementation of
the front-end of the
system
Implementation
of the main
screen giving
the login, screen
that follows the
login giving
various options,
screens for
facility-heads,
screens for the
administrator
functions etc.
7-10 During this
milestone
period, it would
be a good idea
for the team (or
one person from
the team) to
start working on
a test-plan for
the entire
system. This
test-plan can be
updated as and
when new
scenarios come
to mind.
26

5 Integrating the
front-end with the
database
The front-end
developed in the
earlier milestone
will now be able
to update the
facilities
database. Other
features like
mail notification
etc should be
functional at this
stage. In short,
the system
should be ready
for integration
testing.
11-13
6 Integration Testing The system
should be
thoroughly
tested by
running all the
testcases written
for the system
(from milestone
5).
14-15 Another 2
weeks should be
there to handle
any issues found
during testing of
the system.
After that, the
final demo can
be arranged.
7 Final Review Issues found
during the
previous
milestone are
16-18 During the final
review of the
project, it
should be
27

fixed and the
system is ready
for the final
review.
checked that all
the
requirements
specified during
milestone
number 1 are
fulfilled (or
appropriate
reasons given
for not fulfilling
the same)

Guidelines and References
http://w3schools.com
en.wikipedia.org/wki/online voting system
http://www.functionx.com/sqlserver/ (SQL-server tutorial)







28

CHAPTER 5
SOFTWARE TESTING

5.1 Testing
Software testing is done to check or test the software application in all aspects after
testing the software in all the phases and when the software fulfils all the requirement
specifications and completely tested and verified by the testing team than the software
is forwarded to the market and in this way the software application is uses by the
users for organizational or personal purpose. This whole process is known as testing.
Software testing can be stated as the process of validating and verifying that a
computer program/application/product: meets the requirements that guided its design
and development, works as expected, can be implemented with the same
characteristics, and satisfies the needs of stakeholders.
Software testing, depending on the testing method employed, can be implemented at
any time in the software development process. Traditionally most of the test effort
occurs after the requirements have been defined and the coding process has been
completed, but in the Agile approaches most of the test effort is on-going. As such,
the methodology of the test is governed by the chosen software development
methodology.
Testing can never completely identify all the defects within software. Instead, it
furnishes a criticism or comparison that compares the state and behavior of the
product against oracles principles or mechanisms by which someone might recognize
a problem. These oracles may include specifications, contracts, comparable products,
past versions of the same product, inferences about intended or expected purpose,
user or customer expectations, relevant standards, applicable laws, or other criteria.

29

A primary purpose of testing is to detect software failures so that defects may be
discovered and corrected. Testing cannot establish that a product functions properly
under all conditions but can only establish that it does not function properly under
specific conditions. The scope of software testing often includes examination of code
as well as execution of that code in various environments and conditions as well as
examining the aspects of code: does it do what it is supposed to do and do what it
needs to do. In the current culture of software development, a testing organization
may be separate from the development team. There are various roles for testing team
members. Information derived from software testing may be used to correct the
process by which software is developed.
Every software product has a target audience. For example, the audience for video
game software is completely different from banking software. Therefore, when an
organization develops or otherwise invests in a software product, it can assess
whether the software product will be acceptable to its end users, its target audience,
its purchasers and other stakeholders. It is the process of attempting to make this
assessment
5.2 Types of Testing
1. Black box testing Internal system design is not considered in this type of testing.
Tests are based on requirements and functionality.

2. White box testing This testing is based on knowledge of the internal logic of an
applications code. Also known as Glass box Testing. Internal software and code
working should be known for this type of testing. Tests are based on coverage of code
statements, branches, paths, conditions.
3 Unit testing Testing of individual software components or modules. Typically it
is done by the programmer and not by testers, as it requires detailed knowledge of the
internal program design and code may require developing test drivers modules or test
harnesses.
30

4 Incremental Integration Testing Bottom up approach for testing i.e continuous
testing of an application as new functionality is added; Application functionality and
modules should be independent enough to test separately done by programmers or by
testers.
5 Integration Testing Testing of integrated modules to verify combined
functionality after integration. Modules are typically code modules, individual
applications, client and server applications on a network, etc. This type of testing is
especially relevant to client/server and distributed systems.
6 Functional testing This type of testing ignores the internal parts and focus on the
output is as per requirement or not. Black-box type testing geared to functional
requirements of an application.
7 System testing Entire system is tested as per the requirements. Black-box type
testing that is based on overall requirements specifications, covers all combined parts
of a system.
8. End-to-end testing Similar to system testing, involves testing of a complete
application environment in a situation that mimics real-world use, such as interacting
with a database, using network communications, or interacting with other hardware,
applications, or systems if appropriate.
9. Sanity Testing - Testing to determine if a new software version is performing well
enough to accept it for a major testing effort. If application is crashing for initial use
then system is not stable enough for further testing and build or application is
assigned to fix.
10. Regression testing Testing the application as a whole for the modification in
any module or functionality. It is difficult to cover all the system in regression testing
so typically automation tools are used for these testing types.
31

11. Acceptance testing -Normally this type of testing is done to verify if system
meets the customer specified requirements. User or customer do this testing to
determine whether to accept application.
12. Load testing Its a performance testing to check system behavior under load.
Testing an application under heavy loads, such as testing of a web site under a range
of loads to determine at what point the systems response time degrades or fails.
13. Stress testing System is stressed beyond its specifications to check how and
when it fails. It is performed under heavy load like putting large number beyond
storage capacity, complex database queries, continuous input to system or database
load.
14. Performance testing Term often used interchangeably with stress and load
testing. To check whether system meets performance requirement, used different
performance and load tools to do this.
15. Usability testing User-friendliness check. Application flow is tested, Can new
user understand the application easily, Proper help documented whenever user stuck
at any point. Basically system navigation is checked in this testing.
16. Install/uninstall testing - Tested for full, partial, or upgrade install/uninstall
processes on different operating systems under different hardware, software
environment.
17. Recovery testing Testing how well a system recovers from crashes, hardware
failures, or other catastrophic problems.
18. Security testing Can system be penetrated by any hacking way, Testing how
well the system protects against unauthorized internal or external access. It is checked
if system, database is safe from external attacks.
32

19. Compatibility testing Testing how well software performs in a particular
hardware/software/operating system/network environment and different combinations
of above.
20. Comparison testing Comparison of product strengths and weaknesses with
previous versions or other similar products.
21. Alpha testing In house virtual user environment can be created for this type of
testing. Testing is done at the end of development. Still minor design changes may be
made as a result of such testing.
22. Beta testing Testing typically done by end-users or others. Finally, the testing
before releasing application for commercial purpose.
23. Glass box testing- Glass box testing is the same as white box testing. It is a
testing approach that examines the application's program structure, and derives test
cases.
24. Open box testing- Open box testing is same as white box testing. It is a testing
approach that examines the application's program structure, and derives test cases.
25. Black box testing- Black box testing a type of testing that considers only
externally visible behaviour. Black box testing considers neither the code itself, nor
the "inner workings" of the software. You CAN learn to do black box testing, with
little or no outside help.
26. Unit testing- Unit testing is the first level of dynamic testing and is first the
responsibility of developers and then that of the test engineers. Unit testing is
performed after the expected test results are met or differences are explainable/
acceptable.


33

CHAPTER 6
CODING
6.1 Client side code
6.1.1. Give.html
<html>
<body>
<form method="POST" action="give.php">
<center>
<table>
<tr>
<td>Enter your voter_id</td><td> <input type="textname="t1"></td>
</tr>
<tr>
<td>Enter your name</td><td> <input type="text" name="t2"</td>
</tr>
<tr>
<td>Select your party</td><td> <select name="t3"> <optionvalue=select>select
<option value=Congress>Congress
<option value=BJP>BJP
34

<option value=BSP>BS
<option value=SP>SP
<option value=TMC>TMC
<option value=AAP>AAP
</select>
</td>
</tr>
<tr><td><input type="submit"value="Submit"</td>
</tr>
</center>
</table>
</form>
</body>
</html>
6.1.2. Give.php
<?php
$a=$_REQUEST['t1'];
$b=$_REQUEST['t2'];
$c=$_REQUEST['t3'];
35

$con=mysql_connect("localhost","root");
$db=mysql_select_db("votesce",$con);
$query=mysql_query("insert into vote(voterid,name,pname)values('$a','$b','$c')");
echo "<center><b><font size=10 color=green face=forte>Thanks for
voting</font></b></center>";
mysql_close($con);
?>
6.1.3. head.html
<html>
<body background="image/1.jpg">
<center>
<font size=10 ><b>VOTE_4_INDIA</b></font>
</center>
</body>
</html>
6.1.4. Left.html
<html>
<body bgcolor=orange>
<table>
<tr>
36

<td><img src="image/bjp.jpg" height=150 width=250></td>
</tr>
<tr>
<td><img src="image/congress.jpg" height=150 width=250></td>
</tr>
<tr>
<td><img src="image/app.jpg" height=150 width=250></td>
</tr>
</table>
</body>
</html>
6.1.5. Login.html
<html>
<head>
<title>www.vote_4_india.com</title>
</head>
<frameset rows="20%,*" frame border="no">
<frame src="head.html " name="frame1">
<frameset cols="20%,60%,20%">
37

<frame src="left.html " name="frame1">
<frame src="main.html " name="frame1">
<frame src="right.html " name="frame1">
</frameset>
</frameset>
</html>
6.1.6. Main.html
<html>
<body>
<form method="POST" action="vote.php ">
<center>
<table>
<tr>
<td><marquee><img src="image/m1.jpg" height=100 width=100><img
src="image/m2.jpg" height=100 width=100><img src="image/m3.jpg" height=100
width=100></marquee></td>
</tr>
<tr>
<td>Voter_id</td><td><input type="text" name="t1"></td>
</tr>
38

<tr>
<td>Password</td><td><input type="password" name="t2"></td>
</tr>
<tr>
<td><input type="submit" value="Login"></td><td><a href="sing.html"><input
type="button" value="Sing_up"></a></td>
</tr>
<tr>
<td><marquee><img src="image/m4.jpg" height=100 width=100><img
src="image/m5.jpg" height=100 width=100><img src="image/m6.jpg" height=100
width=100></marquee></td>
</tr>
</center>
</table>
</form>
</body>
</html>
6.1.7. Right.html
<html>
<body bgcolor=green>
39

<table>
<tr>
<td><img src="image/sp.gif" height=150 width=250></td>
</tr>
<tr>
<td><img src="image/tmc.jpg" height=150 width=250></td>
</tr>
<tr>
<td><img src="image/bsp.jpg" height=150 width=250></td>
</tr>
</table>
</body>
</html>
6.1.8. Sign.html
<html>
<body>
<form method="POST" action="sing.php">
<table>
<tr>
40

<td>Enter your Voter_id :</td><td><input type="text" name="t1"></td>
</tr>
<tr>
<td>Enter your Name :</td><td><input type="text" name="t2"></td>
</tr>
<tr>
<td>Enter your Father/Husband name :</td><td><input type="text"
name="t3"></td>
</tr>
<tr>
<td>Enter your Gender :</td><td><input type="text" name="t4"></td>
</tr>
<tr>
<td>Enter your Date of birth :</td><td><input type="date" name="t5"></td>
</tr>
<tr>
<td>Enter your Address :</td><td><textarea rows=5 cols=40
name="t6"></textarea></td>
</tr>
<tr>
41

<td>Enter your Password :</td><td><input type="password" name="t7"></td>
</tr>
<tr>
<td><input type="submit" value="Submit"</td><td><input type="reset"
value="Reset"</td>
</tr>
</table>
</form>
</body>
</html>
6.1.9. Sign.php
<?php
$a=$_REQUEST['t1'];
$b=$_REQUEST['t2'];
$c=$_REQUEST['t3'];
$d=$_REQUEST['t4'];
$e=$_REQUEST['t5'];
$f=$_REQUEST['t6'];
$g=$_REQUEST['t7'];
$con=mysql_connect("localhost","root");
42

$db=mysql_select_db("votesce",$con);
$query=mysql_query("insert into
sing(voterid,name,fhname,gender,dob,address,pass)values('$a','$b','$c','$d','$e','$f','$g'
)");
echo"<center><b><font size=10 color=blue face=forte><a href=main.html>You are
regeistered</a></font></b></center> ";
mysql_close($con);
?>
6.1.10. Vote.php
<?php
$con = mysql_connect("localhost","root");
$db=mysql_select_db("votesce", $con);
$x=$_REQUEST['t1'];
$y=$_REQUEST['t2'];
$result = mysql_query("SELECT * FROM sing where voterid='$x' AND pass='$y'");
setcookie("user", "$x", time()+3600);
if($row = mysql_fetch_array($result))
{
header("Refresh: 0;url=give.html");

43

}
else
{
echo" Invalid voter_id OR password";

}
mysql_close($con);
?>
6.2 Admin side code
6.2.1. Admin.php
<?php
$a=$_REQUEST['t1'];
$b=$_REQUEST['t2'];
$con = mysql_connect("localhost","root");
$db=mysql_select_db("votesce", $con);
$result = mysql_query("SELECT * FROM admin where uname='$a' AND
pass='$b'");
setcookie("user", "$a", time()+3600);
if($row = mysql_fetch_array($result))
{
44

header("Refresh: 0;url=result.php");
}
else
{
echo" Invalid voter_id OR password";
}
mysql_close($con);
6.2.2.head.html
<html>
<body background="image/1.jpg">
<center>
<font size=10 ><b>VOTE_4_INDIA</b></font>
</center>
</body>
</html>
6.2.3 Left.html
<html>
<body bgcolor=orange>
<table>
45

<tr>
<td><img src="image/bjp.jpg" height=150 width=250></td>
</tr>
<tr>
<td><img src="image/congress.jpg" height=150 width=250></td>
</tr>
<tr>
<td><img src="image/app.jpg" height=150 width=250></td>
</tr>
</table>
</body>
</html>
6.2.4.Login.html
<html>
<head>
<title>www.vote_4_india.com</title>
</head>
<frameset rows="20%,*" frame border="no">
<frame src="head.html " name="frame1">
46

<frameset cols="20%,60%,20%">
<frame src="left.html " name="frame1">
<frame src="main.html " name="frame1">
<frame src="right.html " name="frame1">
</frameset>
</frameset>
</html>
6.2.5. Main.html
<html>
<body>
<form method="POST" action="admin.php ">
<center>
<table>
<tr>
<td><marquee><img src="image/m1.jpg" height=100 width=100><img
src="image/m2.jpg" height=100 width=100><img src="image/m3.jpg" height=100
width=100></marquee></td>
</tr>
<tr>
<td>User_Name</td><td><input type="text" name="t1"></td>
47

</tr>
<tr>
<td>Password</td><td><input type="password" name="t2"></td>
</tr>
<tr>
<td><input type="submit" value="Login"></td>
</tr>
<tr>
<td><marquee><img src="image/m4.jpg" height=100 width=100><img
src="image/m5.jpg" height=100 width=100><img src="image/m6.jpg" height=100
width=100></marquee></td>
</tr>
</center>
</table>
</form>
</body>
</html>



48

6.2.6. Result.php
<?php
$con=mysql_connect("localhost","root");
$db=mysql_select_db("votesce",$con);
$query=mysql_query("select* from vote");
Print "<table border cellpadding=3>";
while($info = mysql_fetch_array( $query ))
{
Print "<tr>";
Print "<th>voterid:</th> <td>".$info['voterid'] ."</td> ";
Print "<th>Name:</th> <td>".$info['name'] ." </td>";
Print "<th>PartyName:</th> <td>".$info['pname'] . " </td>
</tr>";
}
Print "</table>";
echo"<table border='1' style='border-collapse: collapse;border-color:silver,'>";
echo"<tr style='font-weight:bold;'>";
echo"<td width='100'align='center'>PARTY NAME</td>";
$result=mysql_query("SELECT pname,COUNT(DISTINCT(voterid))
49

FROM vote GROUP BY pname");
while($row=mysql_fetch_array($result))
{
echo "<tr>";
echo "<td align='center' width='200'>".$row['pname']."</td>";
echo "<td align='center' width='200'>".$row['COUNT(DISTINCT(voterid))']."</td>";
echo "</tr>";
}
echo "</table>";
mysql_close($con);
?>
6.2.7 Result.html
<html>
<body bgcolor=green>
<table>
<tr>
<td><img src="image/sp.gif" height=150 width=250></td>
</tr>
<tr>
50

<td><img src="image/tmc.jpg" height=150 width=250></td>
</tr>
<tr>
<td><img src="image/bsp.jpg" height=150 width=250></td>
</tr>
</table>
</body>
</html>










51

6.3 Snapshots
6.3.1 Login Page







52

6.3.2 Sign up page








53

6.3.3 Admin Page








54

6.3.4 Number of votes and result




55

CHAPTER 7
CONCLUSION
The project titled as Online voting system is a web based application. This software
provides facility for reporting online vote, sign up, and result can only be seen by the
admin. This software is developed with scalability in mind. Additional modules can
be easily added when necessary. The software is developed with modular approach.
All modules in the system have been tested with valid data and invalid data and
everything work successfully. Thus the system has fulfilled all the objectives
identified and is able to replace the existing system.
The project has been completed successfully with the maximum satisfaction of the
organization. The constraints are met and overcome successfully. The system is
designed as like it was decided in the design phase. The project gives good idea on
developing a full-fledged application satisfying the user requirements.
The system is very flexible and versatile. This software has a user-friendly screen
that enables the user to use without any inconvenience. Validation checks induced
have greatly reduced errors. Provisions have been made to upgrade the software. The
application has been tested with live data and has provided a successful result. Hence
the software has proved to work efficiently.








56

CHAPTER 8
SCOPE FOR FUTURE ENHANCEMENT
Using database more over High speed, accuracy and non-redundant data are the main
advantages of the proposed system. In the proposed system the user is provided with
a choice of data screen, which are similar in formats to the source documents. Data
entry errors can be minimized through validity checks. After the verification only the
data are placed the permanent database. The software can be developed further to
include a lot of modules because the proposed system is developed on the view of
future, for example we should develop the system as a database independent using
JDBC so we can connect it to any other database, Now the proposed system is based
on PC and intranet but in the future if we need to convert it into internet then we need
to change the front end only because we are developing this on the basis of OOP
technology and most of the business logics are bounded in the class files and module
like reusable components.








57

References
http://w3schools.com
en.wikipedia.org/wki/online voting system
http://www.functionx.com/sqlserver/ (SQL-server tutorial)

Anda mungkin juga menyukai