Beruflich Dokumente
Kultur Dokumente
INTRODUCTION
The solution for this problem is to develop a web based application to allow the
students vote using a computer or smartphone. The Web Based system make the voting
process easier. Because the votes are automatically counted after casting the vote. The
election can be monitored via viewing the partial results as indicated in the form of real
time bar graph percentage of casted votes, the users/student need to register into the
system for the privacy of the User Account. The system can import excel file. Once the
students/voters have already casting the vote, the system automatically logout and can no
2
longer log in. It also shorten time of counting and preparing reports because the results
are generated with printable and detailed result after the election. The system can also
have reports for those students who did not participate. When the student is already cast
the vote the system automatically logout and no longer login during the election for
reliable and accurate canvassing of vote.
The main purpose of the project is to facilitate the process of election of SSC
using the system, the Comelec easily generate report and to lessen the time of voting and
canvassing because the vote automatically count after casting the vote. The system
provide bar graph, to monitor the reliable election. After the election the Comelec/SSC
Adviser will no longer to write the winners in Manila paper because the system provide
printable and detailed result. The E-VOTING SYSTEM is Web based application that
access using different devices. The different functionality describes the system below:
E-Voting System is a web based system application that can be access in a Local
Area Network (LAN). This system focuses on facilitating the election of the Supreme
Student Council (SSC). The system allow two users namely Administrator in the person
of the SSC Adviser and the other users are the students. SSC Administrator is capable of
logging in to the system to manage it and manage filling of candidacy of the students.
Print detailed report of the election results, print who did not voted in the election.
Students are allowed to access the system, register before casting vote and. After the
election the admin can print immediately the result of the election. To implement the
system through the web browser the student can be used in any platform using different
web browsers.
4
CHAPTER II
LITERATURE REVIEW
Mobile voting falls under a category of voting called e- voting, which is short for
electronic voting‘, and refers to the option of using electronic means to vote in
referendums and elections. There are systems such as DRE (Direct Electronic Recording)
voting machines that record the vote without that vote being transmitted over the Internet
or another network.
Mobile Voting System (MVS) is a system that will operate in parallel with the
existing manual and automated voting processes. It will enable legitimate voters to cast
their vote from wherever they please using their mobile devices unlike other means that
require the voter to appear at the polling station. This will help alleviate the nuisance of
long queues at poll-sites which waste a lot of time. It will also ease the vote-counting
process which will be done instantly as the voting progresses and a graphical display will
be available on a site (attached to the system) for all stakeholders to view progress, hence
ensuring transparency. -Author/s: Oyite David Robinson Et Al. (Thursday, 10 November
2011) Mobile Voting Systems. Retrieved from http://mobilevotingsystems.blogspot.com
Mobile Technology is most imperative on the current era. It can get upgraded data
utilizing cell phones. Such gadget can be utilized for individual and business exchanges.
Besides, cell phones usefulness has developed massively. These days, it can be utilized
for an assortment of purposes like to find puts much like a GPS, to peruse standardized
tags, to play recreations, to search the Internet, to know climate reports, to vote, thus
considerably more. Significantly the most important uses are the voice calls, video calls
and Short Messaging System (SMS). Currently various models of mobile phones have
come out in the market and each one having special advantages over the others. The SMS
or message facility is important in the mobile device. It allows the sender to send
messages from one mobile to another mobiles device. Most business establishments
advertise through print media like the newspapers, magazines, pamphlets, brochures, and
so much more. It also makes use of the radio to promote their product and services.
The Voice of the Philippines Voting System – this TV program shows a voting
process that is somehow related to the proposed project. The voting system in the TV
show includes a text/SMS messaging to vote on the desired contestant. The automated
voting for the contestant shows relevance to the proposed project. Online Banking
6
Applications – nowadays, National and Local Banks follow the technology trend. Almost
all the banks have upgraded the existing system into a more efficient and convenient way
for the users. Following the trend, banks developed mobile applications for the users to
have convenient way in accessing one’s account. The creation of mobile apps based from
the existing project is the primary relevance in this study. The proposed project is a
mobile app based on the existing voting process of the Philippines. Election experts still
doubt PCOS machines' credibility as 2016 polls loom - Decision specialists still
uncertainty PCOS machines' believability as 2016 surveys loom Manila – After two
computerized surveys in 2010 and 2013, specialists and backers for solid and genuine
races on Monday communicated question on the validity of the Precinct Counting Optical
Scan (PCOS) supplied by Smartmatic Philippines, taking note of that significant shields
are not yet in place. Professor Nelson Celis, representative of Automated Election System
Watch (AESWatch), said that while there is undoubtedly on the voting itself, they are
restless about the limit of the units to steadfastly mirror the votes cast in light of the fact
that the PCOS machines are not dependable, as seen, he said, in the Philippine
experience. "There is no issue with voting, in the perspective of AESwatch; the
unavoidable issue is about the association. We accept not all votes cast were reflected. In
light of the data we assembled in the 2010 and 2013 races, the machines were not that
dependable," according to Celis.
2.3 Synthesis
E-Voting System, one of the modern processing and facilitating of the election.
This study helped the researchers to design database that reduces space requirements.
Designing a normalized database is a big factor considering the level that is appropriate
for the design system. Aside from the primary actions rendered by the system like add,
edit, delete and voting process functions which are considered as the fundamental actions
of E-Voting System, it will boost the performance of the university in Election of the
Supreme Student Council (SSC). The system is capable of generating printed detailed
reports.
7
The reasons, the researchers designed and developed E-Voting System to provide
innovation in the University to modernize the election of the SSC officer. The system has
the capability to facilitating the election. It also generate printed detailed of the election
result and print students who did not voted in the election.
8
CHAPTER III
TECHNICAL BACKGROUND
The figure above shows the technical framework of the study where there are
three (3) layers. The user layer will access the system through connecting to the Local
Area Network (LAN) where the application was installed. Once query will be performed
by the users, the application will request from the data layer. Then Data layer will
respond for every content requested by users.
9
The E-Voting System is a web based application system that can be access in a
Local Area Network (LAN). The system allow two users namely Administrator in the
person of the SSC Adviser and the other users are the students. SSC Administrator is
capable of logging in to the system to manage filling of candidacy of the students,
canvassing the votes, and monitoring the election. The Administrator is authorized for the
records of the enrolled student into the system. The system verify the ID number of the
student before registration. If the user is not been enrolled the system automatically
detects and the system not allow the user to create user account in the system. The
enrolled users/student create an account for the privacy to vote. Through the web browser
the student can be used in any platform using different web browsers. The system
automatically logout the account of the student after casting their votes. After the election
the admin can print immediately the result of the election and the student who did not
voted in the election.
10
CHAPTER IV
METHODOLOGY
This Chapter we will discuss the application to be used, who will be the user and
respondent, where is the system deployment and start the following functionalities of the
system by using Diagrams, Data process, Network Model, Network topology, Analysis,
Development and Design. Fishbone Diagram.
4.1 Environment
The researcher conducted the study at Isabela State University NIA, Batal
Santiago City Isabela.
The study was conducted at Isabela State University NIA, Batal Santiago
Extenion. The respondent of the study were the Bachelor of Science in Information
Technology (BSIT) with 219 students, Bachelor of Science in Agriculture (BSA) with 69
students. A total of 288 students.
11
The figure above shows the organizational chart of Isabela State University
Santiago Campus where the study was conducted.
12
The fishbone diagram below shows the major causes that have been undergone by
the system to achieve the desired effect.
Time
consuming and
unreliable
canvassing of
votes.
Manpower
This figure explains the diagram of the problems encountered by the researchers.
It shows that the main problem the election officers is unreliable and time consuming due
to machinery, method, manpower and material.
13
The figure above shows the different module in the system. The Administrator
can login and manage the students and the election. It can provide printable result of the
election. The students must be register in to the system before casting vote and the system
automatically compute the vote, student need to fill up the form of file of candidacy
before run for the respective position and the administrator manage the filing candidacy
of the students.
14
The table shows the deliverables and the duration of the system, the deliverables
contains the following: Concept Proposal, Project Planning, Development, Testing,
Evaluation and Documentation with the duration of date.
15
Feed Back
The above figure shows the basic inputs of a user to the system and how the
system processes it and return an output.
Basically for the Student/Voters, they should log-in into the system using their
own accounts in order to use the system, as well as the Admin and Students/Voters, the
system will verify and validate the log-in and registration details and direct it to the
system.
4.3.2 Control
The system provides log-in security to ensure that only the registered
student can use the system. The system verifies the student who registered through their
personal information. The system not accepts users who were not officially enrolled
students since only the official.
16
The researchers used Data Flow Diagram to identify the flow of the system.
The figure shows that the Administrator login into the system to manage it. The
Administrator manage the filing of candidacy of the students and. The Administrator also
manage the students record. Print detailed elections results and students who did not
voted in the election.
18
This figure shows students need to register and the system verify the
school id to prevent dummy account, after that the system ask the control number before
casting the vote. The student need to fill up the form of file of candidacy and give it to the
admin and the admin filed it.
19
4.5 Analysis
4.5.1 Cost Benefit Analysis
Table 2. Cost Benefit Analysis
MySQL 0.00
XAMPP 0.00
Development Cost
Electricity 400.00
Schedule 2 – Hardware
Depreciation
No. of Months 12
No. of Months 12
Schedule 4 – Electricity
The Table above shows all the expenses under the development of the system.
It specifically contains the equipment used and the salary of each programmer that are
under the construction of the system.
22
Risk
Elements
The table above shows the summary of risk management plan and it
contains the Event (Risk Elements) its Risk and Consequence and graded its
probability, mitigation, impact, contingency, risk, reduction and exposure.
23
4.6 Design
4.6.1 Wireframes
4.6.1.1 Administrator side
Figure 15.Register.
This figure shows the register form to create account.
Figure 16.Vote.
This figure shows the voting process.
27
Table above shows the personal information and the account of the
administrator.
Table above shows the partylist of the candidates. Its consists of party name,
tagline and color of the party list.
31
The table above shows the course of the students. Its consists of course name
and course code.
This figure shows the three tier architecture broken down as follows: client tier,
data tier, application tier.
Presentation tier: The top-most level of the application is the user interface. The main
function of the interface is to translate tasks and results to something the user can
understand.
Application tier: This layer coordinates the application, processes commands, makes
logical decisions and evaluations and performs calculations. It also moves and
processes data between the two surrounding layers.
Data tier: Here information are stored and retrieved from a database or file system.
The information is stored then passed back to the logic tier for processing and then
eventually back to the user.
34
4.8 Development
Specs
Hardware
Intel(R)Pentium(R)
1. Processor
Type: Intel Celeron
Processor 2.4 GHz
Number of Cores: Dual
Core
CPU:G630 2.70 GHz
CPU Upgradability:
Upgradable
Chipset Type: Intel E7230
RAM
2. Memory
Installed Size: 2.00 GB
Technology: DDR2
SDRAM-ECC
Memory Speed: 533,0
MHz
The table above shows the recommended hardware specifications needed by the
system to run. It must meet the necessary hardware specifications to avoid
miscalculations and hanging of the system.
35
Bootstrap - The researchers used bootstrap in designing the web pages of the
system.
Administrator
Login
Import Excel file
File Candidacy
Print detailed report of the election results
Print who did not participate
Student
Login
Vote
Register
36
Front End
Adobe Photoshop - The developers used this to design and to edit
pictures that are embedded to the system. Button and images was
edited using this software for styling and designing.
PHP - The developers use this scripting language because it provides a
full suite of tools for building dynamic websites.
Bootstrap - The researchers used in designing the webpages of the
system.
Back End
MySQL – The developers used MySQL as the database management
system.
37
The figure shows how the system was deployed and how the data focus in the
system works. The user sends request using the system in the computer and the request is
sent through the internet and the data is processed in the system and the administrator.
Once the process is validated, the system send information data in the system whether the
request is approved of denied and it is sent to the account of the user.
4.8.6 Testing
Compatibility Testing
The developer used this type of testing to determine how compatible the
system interface into the different web browsers.
38
4.10 Evaluation
The researchers used Technology Acceptance Model (TAM) to determine how
users come to accept and use a technology. The model suggests that when the users are
presented with a new technology, a number of factors influence their decision about how
and when they will use it.
The User Acceptance Testing (UAT) was also conducted by the researchers, user
acceptance testing is the usage of the software by people from the intended audience and
recording and correcting of any defects which are discovered. It gives user the chance to
39
interact with the software and find out if everything works as it should if features have
been overlooked, miscommunicated, not communicated and so on.
The researchers used likert scale to determine, evaluate and to give feedback to
the system. According to Likert 1932 formula and interpreting the result is shown below.
This has been used to determine whether the respondents rated “Strong Agree (SA)”,
“Agree (A)”, “Undecided (U)”, “Disagree (DA)”, and “Strongly Disagree (SD)”.
CHAPTER V
RESULT AND DISCUSSION
This chapter show the screen shot of the system from administrator and the
student/voters side.
5.1.2 Students/Voters
Figure 28.Vote
This figure shows the voting process when click each position have pop up a
candidates. Click vote me and after that have confirmation for the candidates you vote.
45
5.2 Testing
JavaScript works
properly on web pages -
without error messages √ √ √
This table shows the result of the compatibility testing conducted with the
different web browsers such as Google Chrome, Mozilla Firefox and Internet Explorer.
The researchers run the system and test if the browser displays the interface of the system
properly and performs the features of the system based on the way it was being
developed by the researchers. The result shows that the different browsers can adopt and
run the system interface design and features.
47
MEAN 4.66 SA 5 SA
4.83 SA
Students QR Faculty QR
PERCEIVED EASE OF
USE
MEAN 4.48 SA 5 SA
4.74 SA
GRAND MEAN 4.78 SA
48
Strong Agree (SA), Agree (A), Undecided (U) Disagree (DA) Strongly Disagree
(SD). This table shows the evaluation result in terms of Usefulness obtained a mean of
4.66 from the students, 5 from the faculties which resulted to the mean of 4.83equivalent
to Strongly Agree, while in terms of Ease-of-Use, 4.48 from the students, 5 from the
faculties resulted to a mean of 4.74 equivalent to Strongly Agree. And the total grand
mean of the evaluation is 4.78 which equivalents strongly agree. According to the
evaluation the lowest evaluation from the students and faculties is in terms of ease-of-use
before the evaluation the researchers demonstrated the system once and no formal user’s
training was conducted.
49
CHAPTER VI
SUMMARY, CONCLUSION, AND RECOMMENDATIONS
6.1 Summary
6.2 Conclusion
1. The system managed the election and the students. It contains module where
in the user/students need to register into the system for the privacy of the User
Account. All functionalities were tested and performed well and with no
errors.
2. The E-Voting System was tested in terms of interface design on three (3) web
browsers. Based on the result, all web browsers working well for the
compatibility of the system.
3. The evaluation result in terms of Ease Usefulness is 4.83 equivalent to
Strongly Agree; while in terms of Ease of Use is 4.74 equivalent to Strongly
Agree. And grand mean of the evaluation is 4.78 which equivalent to Strongly
Agree. The evaluation that the system is useful to the organization and easy to
use for the user thus it is acceptable.
6.3 Recommendations
Based on the aforementioned conclusions, the following recommendations are
given for the future researchers:
Create android application of the system.
Send SMS notification to students who did not yet vote as a reminder.
Add features and other functionalities.
51
REFERENCES
A. Fujioka, T. Okamoto, and K. Ohta, “A Practical Secret Voting Scheme for Large Scale
Elections”, Advances in Cryptology - AUSCRYPT, 1992.
Herschberg, Mark A. (Mark Allan), “Secure Electronic Voting over the World Wide
Web”, Master’s Thesis, Department of Electrical Engineering and Computer Science,
Massachusetts Institute of Technology, May 1999.
“Hand Book for Presiding Officers” (At Elections where Electronic Voting Machines are
used), published by “West Bengal State Election Commission” in 2000.
David Clausen, Daryl Puryear and Adrian Rodriguez, “Secure Voting Using
Disconnected, Distributed Polling Devices”, Department of Computer Science, Stanford
University, June 05, 2000.
52
Lorrie Faith Cranor, “Voting After Florida: No Easy Answers”, Technical Report by
AT&T Shanno Laboratory, Carnegie Mellon University, December 2000.
Salil Prabhakar, “Fingerprint classification and matching with filterbank”, Ph.D Thesis,
University of Michigan State, 2001.
Shuki Bruck, David Jefferson, and Ronald L. Rivest, “Voting – What is, what could be”,
Caltech/MIT Voting Technology Project (VTP) Report, July 2001.
Shuki Bruck, David Jefferson, and Ronald L. Rivest, “A Modular Voting Architecture
(“Frogs”)”, California Institute of Technology, Pasadena and the Massachusetts Institute
of Technology , Cambridge, August 2001.
Ronald L. Rivest, “Integrity of the voting process and the privacy of votes”, Caltech/MIT
VTP Press Conference, July 16, 2001.
Maynard Riley, “Internet Voting: Issues and Research Agendas”, Technical Report by
the National Science Foundation, University of Maryland, March 2001.
Kim Alexander, “Ten Things I Want People to Know About Voting Technology”,
California Voter Foundation, Presented to the Democracy Online Project’s National Task
Force, National Press Club, Washington, D. C., January 18, 2001.
Douglas W. Jones, “Evaluating Voting Technology”, Testimony before the United States
Civil Rights Commission, Tallahassee, Florida, January 11, 2001.
APPENDICES
55
index.php
<?php session_start();
include_once("config.php");
if(isset($_SESSION['admin']))
{
@header("location:(SMVS)admin/");
}
elseif (isset($_SESSION['userid'])) {
@header("location:(SMVS)user/");
}
}
else
{
$insert = mysqli_query($con,"INSERT INTO tbl_active values(id,1)");
}
?>
<!DOCTYPE html>
<html lang="en-US">
<head>
<title>Welcome To Student Mobile Voting System</title>
<meta charset="utf-8">
56
</div>
<div class="navbar-brand w3-hover-grey pull-right w3-round animated
slideInRight" style="cursor: pointer;" id="login" data-toggle="modal" data-
target="#login" data-backdrop="static">
<a href="#" id="login" class="" style="text-decoration:none; color:#00bdb9;"
><span class="fa fa-chevron-down animated rubberBand pulse infinite
"></span></a>
</div>
</div>
</nav>
<div class="row">
<div class="col-sm-12 w3-center">
<header class="w3-white w3-animate-opacity">
<div class="container " style="margin-top:-40px;">
<div id="jlside" class="w3-teal">
<a href="#" class="w3-teal" id="myip">Connect to <?php echo
$_SERVER['SERVER_ADDR']; ?></a>
</div>
<div id="carousel-example" class="carousel slide" data-ride="carousel">
<div class="carousel-inner" >
<div class="item ">
<a href="#" data-toggle="modal" data-target="#isu"><img class="img-
responsive w3-hover-opacity animated rubberBand bounce" style=" width:50%;"
src="img/stg.png" alt=""/></a>
<h3 style="color:#fff;"><small>Isabela State University Santiago
Extension</small></h3>
</div>
<div class="item">
<a href="stat.php" target="blank" ><img class="img-responsive w3-hover-
opacity animated rubberBand bounce" style=" width:50%;" src="img/report.png"
alt=""/></a>
58
<div>
<small>Documenter</small>
</div>
</div>
<div class="col-sm-2"></div>
</div>
</center>
</div>
</div>
<div class="modal-footer">
<div class="text-center">
<p style="font-size:18px; word-break:keep-all; margin:5px;">
<p><small>Copyright © JLDesigns </small>
<div>
<small>All Rights Reserved <?php echo date('Y'); ?></small>
</div>
</p>
</div>
</div>
</div>
</div>
</div>
<script type="text/javascript">
function demo_register(){
$("#demo_reg").show("fast");
$("#welcome").hide("fast");
}
61
</script>
<footer class="navbar navbar-inverse navbar-fixed-bottom animated
slideInUp">
<div class="w3-center">
<div class="w3-margin">
Copyright © JLDesigns All Rights Reserved <?php echo date('Y'); ?>
</div>
</div>
</footer>
<script src="js/jquery.js"></script>
<script src="js/bootstrap.min.js"></script>
<script src="js/bootbox.min.js"></script>
<script src="js/all.js"></script>
<script src="js/w3.js"></script>
<script type="text/javascript" src="js/sweetalert.min.js"></script>
</body>
</html>
62
Register
1. To Register just Click Sign up to register for the creating a secure account.
Verifying Student ID
63
1
2
Creating Account
1. Create/type your own username and password and click sign up.
1
64
Login
1. To go to the login form just click the button at the right side.
Login form
1
65
Control number
1. Get your control number to the comelec officer incharge and type the control number
and click submit.
Voting
1
66
Choosing Candidates
1. Choose your candidate you want to vote and click the “Vote me”
Confirmation of voting
1.The system have confirmation of your vote, just click “Yes” if you want to vote and If
you don’t want just click “Cancel”
1
67
CERTIFICATE OF
IMPLEMENTATION
68
C. Certificate of Implementation
69
70
G R A M M A R I A N’ S
CERTIFICATE
71
D. Grammarian’s Certificate
Date_____________
G R A M M A R I A N’ S C E R T I F I C A T E
This is to certify that the undersigned has reviewed and went through all the pages of the
capstone project entitled “E-VOTING SYSTEM” of Mark Darwin A. Otanes and John Luis
S. Barcelona as against the set of structural rules that govern the composition of sentences,
Signed:
Liezl E. Otanes
_______________
Grammarian
Affiliation: Relative
ID Number:
Contact Details
Mobile Number: 09357013745
eMail Address: liezl@yahoo.com
72
GALLERY
73
E. Gallery
74
75
CURRICULUM
VITAE
76
F. Curriculum Vitae
CP #: 09972350596
PERSONAL INFORMATION
Gender : Male
Nationality : Filipino
EDUCTIONAL BACKGROUND
CP #: 09752231780
PERSONAL INFORMATION
Gender : Male
Nationality : Filipino
EDUCTIONAL BACKGROUND
GLOSARRY
79
G. Glossary
Cascading Style Sheet (CSS) - is a style sheet language used for describing the look and
formatting of a document written in a markup language.
Cost Benefit Analysis (CBA) - is systematic process for calculating and comparing
benefits and cost of a project, decision or government policy.
Data Dictionary (DD) - Holds definition of datasets, tables and data elements. It can be
consulted to understand where a data item fits in the structure, what values it may contain
and basically what the data item means.
Data Flow Diagram (DFD) - is a graphical representation of the flow of data through an
information system, modeling its aspects.
Entity Relationship Diagram (ERD) - Is a data modeling technique that graphically
illustrates an information system’s entities and the relationships between those entities.
Fishbone Diagram - is a tool for analyzing process dispersion. It is also referred to as the
“Ishikawa diagram”. It is a team brainstorming tool used to identify potential root causes
to problems, because of its function it may be referred to as a cause-and effect diagram.
MySQL - is the world’s second most widely used open-source relation database
management system (RDBMS).
PHP - is a server-side scripting language designed for web development but also used as
a general-purpose programming language.
Rapid Application Development (RAD) - is a software development methodology that
uses minimal planning in favor of rapid prototyping.
System is a set of detailed methods, procedures and routines created to carry out specific
activity, perform a duty, or solve a problem.
Wireframe - also known as a page schematic screen blueprint, it is a visual guide that
represents the skeletal framework of a website.
XAMMP - is a free and open source cross-platform web server solution stack package,
consisting mainly of the Apache HTTP Server, MySQL database, and interpreters for
scripts written in the PHP and Perl programming languages.