Escolar Documentos
Profissional Documentos
Cultura Documentos
1.0.
INTRODUCTION
BACKGROUND OF STUDY
each of the
President
360
House of Representatives
109
Senators
36.
States Governors
774
774
1.2
SIGNIFICANCE OF STUDY
1.
2.
3.
4.
5.
SCOPE OF STUDY.
LIMITATION OF STUDY
1.6.
DEFINITION OF TERM
CHAPTER TWO
2.0 LITERATURE REVIEW
David Chaum addressed the concepts of untraceable electronic mail and
digital pseudonyms, which can apply for electronic voting for anonymity.
In order to reduce the cost of human and material, moreover, to enhance
the convenience in the task of polling, E-voting has taken the place of
traditional voting in a considerable number of countries over the past few
years. In this section, I aim to review literature I consider relevant to Evoting.
2.1 EVALUATION OF VOTING EQUIPMENT
In the recent years, voting equipments which were widely adopted may
be divided into five types
(1) Paper-based voting: The voter gets a blank ballot and use a pen
or a marker to indicate he want to vote for which candidate. Handcounted ballots is a time and labor consuming process, but it is
(5) Optical voting machine: After each voter fills a circle correspond
to their favorite candidate on the blank ballot, this machine selects
the darkest mark on each ballot for the vote then computes the
total result. This kind of machine counts up ballots rapidly.
However, if the voter fills over the circle, it will lead to the error
result of optical-scan.
2.2 Effectiveness of E-voting Among Different Countries
Recent years, a considerable number of countries has adopted E-voting
for their official elections. In this section, four empirical examples are
enumerated as following.
(1) America: Government of the United States hold election
collaterally in several ways, in other words, each state can choose
the suitable way to hold elections independently. Because there are
some debates about E-voting, such as some vote casts were not
counted, or election system crashed during the Election Day.
Secretary of State Kevin Shelley established an Ad Hoc Touch
Screen Task Force to research the debates on DRE in February
9
paper tape. Its design balances the policy, electoral procedure and
technology. But all the electoral information (including identity
authentication, audit, or counting of votes) are stored in Microsoft
Access database without setting password so there are high risks of
attack.
(2) iVotronic: The vendor of iVotronic is Election Systems and
Software (ES&S). iVotronic provides multi-language, and uses flash
memory to save voting records. Electoral workers use PEB (Personal
Electronic Ballot, a device which is similar to disk) to start polling
machine up. When the election is finished, the workers use PEB to
access voting records in the polling machine, then delivers PEB to
electoral center or transmits data from network. Because the PEBs
password is only three characters, the risk of password breaking
exists. This system have made mistake in the past elections, such as
the number of voters is not corresponding between master server and
backup server, the candidate selected on the ballot is not the voters
selection, and so forth.
12
(3) eSlate 3000: Hart InterCivic invented eSlate 3000. The voter gets
a personal identity number (PIN) as four digits from electoral
workers, then goes to the booth to input the PIN into polling
machine to login. He can rotate selector wheel to select the
candidate whom he want to poll for. Each terminal connects to the
server which is named JBC (Judges Booth Controller). Counting
of votes will send to JBC from every terminal by network, then
save it in MBB (Mobile Ballot Box). This system doesnt encrypt
voting data, so there are some risks of data security. Furthermore,
the electoral functions are not protected with password, anyone,
even the voter, can finish the election. FreeDOS. This system
operates from disk, so hard disk is not necessary and the discarded
computer is enough. This system is not connected to any networks
and most of keys on the keyboard are disabled, attackers cant find
the way to invade. SAVIOCs advantages are its simple disposition
and low cost, but on the other hand, there are short of GUI and
ease of use on SAVIOC.
13
but
also
insider
(such
as
system
developers
and
14
15
CHAPTER THREE
3.0 RESEARCH METHODOLOGY
In this chapter, the source of data methods of collection, the evaluation of
the existing system and the organization structure of the system problem
are presented.
3.1.
16
SYSTEM DESIGN.
17
2.
3.
4.
5.
18
(B)
Evaluation of forms.
(C)
Interviewing
of
departmental
representatives
polling cards to the newer Electronic voting system (EVS), at the heart of
EVS is the electronic voter register (EVR), which by capturing the names
of all eligible voters, eliminates duplication and there by minimizes
discrepancies in the electrode process. As such, EVR is viewed as a
means of ensuring free and fair elections in Nigeria. As part of the
modernization process. INEC needed to inventory and spatially locate the
agencys 120,000 polling locations scattered around the country, these
locations and threat attributes needed to be linked to EVR.
GIS technology was identified as a potential solution to the problem, and
TTi limited (formerly Adorbel ltd.) a consultant responsible for the field
data collection and project management for INEC. Subcontracted Esri
Business part to design and implement a polling unit (PU) GIS. Geoimaging proposed integrating GIS, digital photography, and DBMS
technologies to create a data collection tool capable of capturing the X, Y
locations and images of existing polling units. Since the clients budget
constraints precluded the purchase of GIS software, the use of an
industry standard development environment to create an application with
GIS/mapping capabilities was also proposed. The application would then
be linked to EVR.
20
21
3.8
23
24
25
Start
Welcome screen
Input password
Is
Password
Ok ?
Error in Password
Stop
Perform Operation
of hardware and
27
After analysis, and discovering the problem of the existing system, there
is need to produces a new produce a new system, which will eliminate
these problems design. To carry out the design effectively, the following
steps are involved:
4.2 INPUT SPECIFICATION
In the input specification we made use of the keyboard to enter the
password, and user name which allows early if right and refuses when
wrong. We also made use of the keyboard to supply text, or number
through the application and supply text program when working with a
high- level program.
All other input data for the system execution are present at menu options
and is selected by sticking easily identifiable keys, example the arrows
keys, example the arrow keys the alphabetic character keys, enter and
escape keys.
4.3 OUTPUT SPECIFICATION
In this system, all outputs are retrieved from disk storage where
information resulting from both input and processing operations has been
previously stored.
28
31
DATA TYPE
AUTONUMBER
TEXT
TEXT
TEXT
TEXT
TEXT
NUMBER
ii.
DATA TYPE
AUTONUMBER
TEXT
TEXT
TEXT
TEXT
TEXT
NUMBER
32
iii.
DATA TYPE
AUTONUMBER
TEXT
TEXT
TEXT
TEXT
TEXT
NUMBER
iv.
DATA TYPE
TEXT
NUMBER
TEXT
TEXT
TEXT
TEXT
TEX
NUMBER
Enter Voters ID
Enter Names
Enter Party
Enter State of origin
Has
Mat No
Been
Registered?
YES
Error Message
Cannot
Register Twice
NO
Database
Process Registration
Generate Voters ID
Enter Voters
ID
And PIN
Is Login
Correct
?
Verify if
the Voter
has
Voted
Before
Yes
Error Message
Cannot Vote
Twice
No
Allow to
Vote
35
Stop
Enter Names
Enter Political party
Enter State of Origin
Process
Registration
Stop
36
Enter Username
and Password
Is Login
Correct?
No
Yes
Display Results
Figure 4.10: view result process
37
CHAPTER FIVE
5.0 SYSTEM REQUIREMENT AND IMPLEMENT OF SYSTEM
SPECIFICATION
The purpose of this section is to highlight on the implementation
environment of the system. This covers the hardware and software
environments for the implementation phase of the system design and
development. A top-down design approach was used in structuring the
program. The system consists of modules and sub-modules which are
linked up to facilitate easy flow of data and control.
5.1 SOFTWARE REQUIREMENT
Software is a collection of programs or instructions written in any
computer language, which enables flexibility to do whatever the user
wants.
This package can only be run and developed with the following
minimum software requirements;38
41
Before printing your document (voting result) you may wish to have an
idea of how it will look when you finally print it. The print preview
feature is used to achieve this. In the print preview window, you can see
the overall appearance of one page, or all the pages. Previewing the
document can save you time and paper, because it reduces the number of
times you print the document before it looks exactly the way you want.
To preview a document either click on the print preview button on the
standard toolbar or choose print preview from the file menu.
5.9 THE PRINT OPTION
You can click the print button on the standard toolbar to print the entire
document using default settings, or you can use the print command to
select different printing options.
5.10 REVIEW OF PROGRAM LANGUAGE IN USE
There are several Program language currently is used in school and they
include Q- BASIC, PASCAL, CH, C Visual Basic and Java etc. However,
this project was done to suit interacting processing rather than batch
processing, also immediately response expected from the computer as
output or feedback to the input in an online processing simplifies and
makes the work faster. It is a high-level language that can be translated
43
5.12 TESTING
During the design stage of the system, of the system was done to verify
its efficiency and resistance to deliberate errors. This can be done in toe
stages which include: Unit testing the performance of the individual parts are
examined using test data.
System testing the parts are linked together and the test data is
used to see if the parts works together.
5.13 ACCESS
Use of right password
5.14 MENU SELECTION
The use of wrong keys for valid options
Press key randomly
Press keys which choice module is being loaded users data entry
Press keys randomly
Highlight with normal keys on keyboard
45
CHAPTER SIX
6.0 CONCLUSIONS
To sum up, this project clarifies the requirements and key elements of Evoting system, and my implementation provides the following features.
To begin with, the accuracy of voters identity and ballot card are ensured
with this voting system. Next, voters identities are not written in the
ballot card to protect voters privacy and confidentiality. This system will
validate whether the ballot card is authorized or not, to make sure only
legal user can vote, and voters authorities are limited in order to prevent
his violation. Furthermore, this system fits in with the parts of principles
proposed by IPI, including secrecy, non-coercibility, integrity, and
uniqueness.
But because of the limitation of incomplete laws and regulations,
absentee voting cant be held. It still needs to be discussed in legislative
46
47
BIBLIOGRAPHY
Baje, E.N. (1998). Records Management Program. Ibadan: Adeyomi
printing press.
Brown, P.T and Payne L.C. (1975). Computer application. New York,
Addison Wesley publishing.
Celestine, C. N.(1689). Management theory and practices. Asaba:
Africana first publishers Ltd.
Chiazor, I. k.
management
Enugu: Unpublished ( Project work). pp30-37
Fedrick, W. T.(1856-1915). Management. Texas a/m University .pp41
Francis, M (2001). computer and process control. Aba: Machitouch
Industrial Nigeria.
Heinz ,W. and Harold, K. (1990).management a global perspective.
University of Francisco.
48
49
APPENDIX
SOURCE CODE
WELCOME PAGE
Private Sub cmdConduct_Click()
Me.Hide
frmLogin.Show
End Sub
Private Sub Form_Terminate()
End
End Sub
Private Sub Form_Unload(Cancel As Integer)
End
End Sub
Private Sub mnuAdmin_Click()
frmAdminLogin.Show
Me.Hide
End Sub
Private Sub mnuExit_Click()
End
End Sub
50
VOTING PAGE
Dim rsCandid As New adodb.Recordset
Dim table As String
Private Sub cmbCandidates_Click()
Set rsCandid = New Recordset
Dim mconn As New adodb.Connection
mconn.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data
Source=INEC.mdb"
rsCandid.Open "select * from " & table & " where ucase(trim(ID))
= '" & UCase(Trim(cmbCandidates.ListIndex + 1)) & "'", mconn,
adOpenKeyset, adLockOptimistic
With rsCandid
lblParty.Caption = .Fields("party")
lblFname.Caption = .Fields("fname")
lblLname.Caption = .Fields("lname")
lblSex.Caption = .Fields("sex")
lblOrigin.Caption = .Fields("state")
End With
End Sub
Private Sub cmdExit_Click()
frmVotersMain.Show
Unload frmLogin
Unload Me
End Sub
Private Sub cmdVote_Click()
51
52
53
table = "localCandidates"
If check_REG(table) = False Then
MsgBox "No registered candidate in this category ",
vbExclamation, "No candidates"
Exit Sub
End If
Unload Me
frmVoteLocal.Show
End Sub
Private Sub cmdLogout_Click()
If MsgBox("Do you want to exit ", vbYesNo, "Logout? ") = vbYes
Then
Unload Me
frmLogin.Show
End If
End Sub
Private Sub cmdState_Click()
table = "stateCandidates"
If check_REG(table) = False Then
MsgBox "No registered candidate in this category ",
vbExclamation, "No candidates"
Exit Sub
End If
Unload Me
frmVoteState.Show
End Sub
RESULTS PAGE
Option Explicit
Dim table As String
54
55
56
57
Unload Me
Set frmReg = Nothing
Exit Sub
Err:
If Err.Number = -2147467259 Then
MsgBox "Error. Mat number has already been registered.",
vbExclamation + vbOKOnly, "Registration Failed"
'txtVotersID.SetFocus
Exit Sub
End If
End Sub
Private Sub Form_Initialize()
voteID = getid
End Sub
Private Sub Form_Load()
58
Dim i As Integer
For i = 0 To UBound(states)
cmbState.AddItem (states(i))
Next i
Adodc1.Recordset.AddNew
rndNum = getRand(1000, 9999)
lblVotersID.Caption = voteID
End Sub
Function getRand(ByVal lower As Integer, ByVal upper As Integer) As
Integer
Randomize
getRand = Int((upper - lower + 1) * Rnd + lower)
End Function
Function getid() As String
Dim num As Integer
num = getRand(1000, 9999) + getRand(1000, 9999)
getid = "INEC-" & CStr(num)
End Function
Private Sub Form_Unload(Cancel As Integer)
frmWelcome.Show
Unload Me
End Sub
59
CONTROL GRID
Option Explicit
Public category As String
Private Sub cmdLogout_Click()
If MsgBox("Do you want to exit ", vbYesNo, "Logout? ") = vbYes
Then
Unload Me
frmWelcome.Show
End If
End Sub
Private Sub cmdManVoters_Click()
Me.Hide
frmManVoters.Show
End Sub
Private Sub cmdRegFeg_Click()
Me.Hide
frmApplyFed.Show
End Sub
Private Sub cmdRegLocal_Click()
Me.Hide
frmApplyLocal.Show
End Sub
Private Sub cmdRegState_Click()
Me.Hide
frmApplyState.Show
End Sub
60
61
End Sub
Private Sub cmdLogin_Click()
On Error GoTo recError
Dim conn As New adodb.Connection
Set recStudent = New adodb.Recordset
conn.Open "Provider=Microsoft.Jet.OLEDB.4.0;Data
Source=INEC.mdb"
recStudent.Open "select * from voters where voters_id = '" &
UCase(Trim(txtVotersID.Text)) & "'", conn, adOpenDynamic,
adLockOptimistic
'conn.Close
62
63
End Sub
Private Sub cmdExit_Click()
Unload Me
frmMain.Show
End Sub
64
65
66
Dim i As Integer
For i = 0 To UBound(states)
cmbstate.AddItem (states(i))
Next i
End Sub
Sub clrText()
Dim temp As Control
For Each temp In Me.Controls
If TypeOf temp Is TextBox Then
temp.Text = ""
End If
Next
End Sub
67
68