Tuesday, 10 May 2016

Online Voting System (Download Project)



ABSTRACT
The proposed model is capable of handling electronic ballots with italicize multiple scopes at the same time, for example presidential and parliamentary amongst others. The model caters for integrity for an election process in terms of functional and non-functional requirements. The functional requirement embedded in the design of the  proposed system warrant well secured identification and authentication process for the voter through of the requirement for the voter through the use of combined simple biometrics, of utmost importance are the requirement for correctness, robustness, coherence, consistence, and security.

TABLE OF CONTENTS

CONTENTS                                                                                                              

Declaration    

Approval
Dedication
Acknowledgement
List of Figures
Abstract
Table of contents

CHAPTER ONE

INTRODUCTION
1.1       Back ground of the study                                                                               
1.2       Scope of the study                                                                                                      
1.3       Motivation                                                                                                      
1.4       Methodology                                                                                                  

CHAPTER TWO
LITRETURE REVIEW
2.0 Preamble                                                                                                               
2. Stages of e-voting process                                                                                      

CHAPTER THREE
RESEARCH METHODOLOGY
3.0 Preamble                                                                                                               
3.1 Method of data collection                                                                                                
3.2 Program Flowchart                                                                                               
3,3 Class Diagram                                                                                                       
3.4 Use Case Diagram                                                                                                
3.5 Activity Diagram                                                                                                  
3.6 Output Design                                                                                                      
3.7 Input Design                                                                                                         
3.8 System Requirements                                                                                           
3.9 Choice of programming language                                                                         

CHAPTER FOUR
SYSTEM IMPLEMENTATION AND EVALUATION
4.1 Preamble                                                                                                               
4.2 system testing and evaluation                                                                               
4.3 System conversion plan                                                                                        
4.5 Security Measures                                                                                                 
4.6 Sample Outputs                                                                                                    

CHAPTER FIVE
SUMMARY, CONLUSIONS AND RECOMMENDATIONS
5.1 Summary                                                                                                               
5.2 Conclusion                                                                                                            
5.3 recommendation                                                                                                   
References                                                                                                                  
Appendix                                                                                                                    
 

CHAPTER ONE

1.0     INTRODUCTION

1.1     Background of the study

The subject of Kaduna polytechnic voting system has been actively discussed on different levels since the beginning of the STUDENT UNION GOVERNMENT (S.U.G) There exist an opportunity and motivation to implement such a project with purpose of offering voters a possibility of e-voting at department election of student union government. The overview gives a general description of the technical and organization system of the planned e-voting system. This project:

                         
       i. Defines the scope of e-voting, in other words, defines the subject in the context of the election process as a whole.
      ii. Specifies the system requirement.
      iii.Specifies the participating student of the college and described their roles.
     iv.Specifies the architecture of the voting system, the general description of functionality, protocols and algorithms.
     v. Analyses and describes possible security hazards and examines the compliance of the system to security rudiments.
       vi.Exact specification of the security level of system component.
       vii.Specification of data structures. Choice of software and hardware platforms.
     viii.Technical structure of the system’s network redundancy, network security measures to be used (firewalls intrusion detection system), architecture of network connection.     
        
        1.2 Scope of the project
Kaduna polytechnic voting system to be discussed makes up a relatively small part of the whole election process, from a technical view point the election are made of following components:
                  i.  Calling the election
                 ii.  Registration of candidates
                 iii. Preparation of polling list
                 iv. Voting (a subset of which is e-voting)
                 v. Counting of voting

Other components such as auditing reviewing of complaints and other supporting activity could be mentioned.

Kaduna polytechnic e-voting system discussed in this paper assumes that:
a) Voter list having prepared and are available in suitable format.
b) The candidate list have been prepared and are available in suitable form.
c)  E-votes are counted separately and are later added to the rest of the votes.

In other words the input of the e-voting system made of from:
a) Voter list (including the polling department and Kaduna) polytechnic assigned to the voter.
b) Candidate list (by students union government S.U.G)
c) Expressed will of the voters, and the output is made from.
                      i.Summarized voting results e-voting.
                     ii. List of voters who used e-voting.
The following figure illustrate the scope of e-voting  system and its input and output parameters.
            
           1.3     Motivation
Today, almost everyone uses internet. That is, almost everyone accessed and uses services provided by the internet. Therefore good knowledge of what services are being provided for is necessary; this is not just for the user, but also for the good of the provider of such services. Because the success of every election is dependent on how many voters patronize such election. 

The voter comes to the allocated polling units to vote, Now the question is ‘are these forms of voting and access suitable for all categories of voters?’ the answer of course is no: because everybody will like his vote counted, that is, they also need to all information about the election particularly the winner, the number of votes casted for each candidate and the date the election was conducted. This prompted for online voting system that will solve all the listed difficulties.
            
            1.4     Methodology
The methodology adopted for this project work is object oriented methodology. Object oriented programming is one of the most common programming language use in the world today. it makes it possible for the program code and the data processed to be grouped together into units called objects. These objects are further grouped into classes which define the attribute that the object must posses, objects also have certain function associated with them called methods, The methods perform some action to the data in the object and return the value to the computer. 

Classes of object can be further grouped into hierarchies in which object of one can inherit methods from another class. Object oriented programming also supports reusability of codes that is, it allows programmers to use codes that has already been designed, written and tested which makes programmer’s task easier. In addition to these, the user interface is graphical which allow usersto input data via device such as computer keyboard mouse and provide articulated graphical output on the computer monitor.



SEE >> HOW TO DOWNLOAD THE COMPLETE PROJECT (CHAPTER 1-5) NOW

 

No comments:

Post a Comment


Gain Admission To 200Level Without Jamb-UTME Through IJMB Program, Any University, Any Course. Forms Now On Sale. 08034801226, 08065101775.



Feel Free To Ask Your Questions Using The Below Comment Box.