Student's Web-Based Voting System For Christian College of Tanauan
Student's Web-Based Voting System For Christian College of Tanauan
Chapter 1
Introduction
controlling and being a voting station simultaneously. The voting system includes an
integrated pointing device with graphical user interface for displaying the ballots. The
voting stations may or may not be interconnected and indeed may operate as a single
The Student Council elections have always been a yearly activity for every
candidates who will represent each position in the Student Council. In order for the
After all the votes have been cast, the voting procedure goes again through several
processes. The votes are collected and are then counted, which could take several
In present generation, people became more literate especially with the use of
Computer machines are of these. Computers now in existence are the most powerful
machines than can almost do anything in people’s lives. Hence, the proponent has
Every academic year in CCT one of the most fundamental critical functions to
the student community takes place. The election of the student’s leaders is held at
July of each academic year in a bid to bring fresh ideas in the running of the student
organization.
The methods of campaign, election and post-election processes have been all
the same since the inception of the student organization. These methods are in every
right acceptable but fall short in this age of information and Technology, in that they
are slow, entertain rigging to some degree and not so friendly to the environment.
The proponent aims to convert the existing manual system of Christian College
of Tanauan into a web-based voting system that will help them to lessen the time of
their voting process. It also provides security for the voter and the system both internal
and external. The external security system may be controlled by the controllers in the
voting area while the internal security system operates independently. The proposed
system will also make their election hassle free, especially to the teachers or
A manual voting requires an accurate count of votes in able to know the results
of the winning candidate after the voting process. The results of manual voting came
into question due to several factors regarding human error and miscount of votes. How
General Problem
How to develop a web-based voting system that will speed up the process of
system used by the election officer on an election that is taking too much time and effort
in the process.
Specific Problem
1. How to develop a web-based voting system that will speed up the process of
3. How to develop a module that will display the result of the election.
Objectives of the Study
General Objectives
To develop a web-based voting system that will speed up the process of election
of Christian College of Tanauan. An upgrade towards the current manual system used
by the election officer on an election that is taking too much time and effort in the
process.
Specific Objectives
with no hassle. The proposed system includes login for administrator and login for the
students. The Admin has the only rights to access the administration area and
authorized to access the transaction such as adding, editing, and deleting of information
inside the system. The students will login as voter. The system is designed with a user
security access level and it is responsible of determining the authenticity of the voter by
his/her given student id number and password. Student that officially registered as voter
can only vote once. The system would be responsible for counting the votes and has
the capability to release required reports regarding the list of voters, candidates and
canvassing of results. Candidate records after the election will be saved and can be
The system is available only for Christian College of Tanauan starting from
elementary up to college level. The system can be accessed through the use of intranet.
The proposed system will help the Christian College of Tanauan in their voting
system and will lead them to the development of their Student Council Organization in
conducting an election. The proposed system will help to eliminate frauds and
maneuvers in canvassing considering that the computer will be the one to count the
votes.
It will also give convenience to those who will use the proposed system like the
students and especially to the facilitators in terms of time consumption, reliability issues
and hassles.
The study can also help in the part of the researchers to boost insights and
information in developing a system for their future studies. The researchers will also
benefit from their study in improving their skills, knowledge and academic performance
in writing a thesis.
The proposed study will also benefits and help the future researcher as their
develop software. The proponents are also open in development of this study.
Chapter 2
Voting System
enable voters to cast polling forms while a gathering of specialists gather votes and
yield the last count for a printed audit trail, to the hacking of the communication links.
Although voting makes many people to believe that voting is the perfect application for
technology, but in reality applying it is hard. For a voting system to be ideal, four
attributes must be satisfied: anonymity, scalability, speed, and accuracy. On-line Voting
System is a web based system that facilitates the running of elections and surveys
online. This system has been developed to simplify the process of organizing elections
and make it convenient for voters to vote remotely from their home computers while
This paper describes an online voting system that was designed to meet the
model was adopted as the methodology for designing the application. In designing the
Online Voting System, Flowcharts, Use Case Diagrams and Data Flow Diagrams (DFD)
were also employed. Results: The system generated a more convenient voter and
candidate registration interface, an efficient voting interface, vote storage and count plus
immediate result compilation etc. Outputs from the application include a page showing a
list of all the registered voters, a list of all qualified candidates, and the results of the
total vote count for each candidate in the Faculty of Science. A functionality test was
also carried out on the developed system where 20 registered students appraised the
have been developed for varying uses. This system however was specifically developed
for use in tertiary institutions and had security capabilities inbuilt into its design. This
originality though peculiar to the adopted case study can be used for developing other
kinds of applications. The system was also designed for faculty level voting but can be
concluded that the Online Voting System incorporates all the features of a regular
Voting system but offers an alternative method of conducting elections that is less
stressful, easier and faster through the use of a network. It eliminates the moribund
activities associated with the manual system and reduces drastically the duration of
elections, thus, resulting in huge financial savings. It is thus recommended for use in
any election if well adjusted. Keywords: Online Voting, Electronic Voting, Democracy,
Voting or casting of lots has become the main method of selecting individuals for
a vacant position. There have been several methods of voting practiced over the years,
ranging from rising of hand, using ballot papers, and even using pebbles as in the
typical case of the Republic of Gambia. It is on this premise that this study was
embarked upon to design and implement an effective Online Voting System for
Academic Institutions. The concept has been implemented for the Regent University
College of Science and Technology in Ghana. The results showed that the online
system was outstanding with real-time results of the voting process and easy
administrative management. The users of the system which involved students as well
as some electoral supervisors realized the online voting system was a better, effective
and more efficient way of voting in the school as compared to the paper balloting
election once the electorates can be identified with unique Identification Numbers. It is
Electronic voting systems can make the voting process much more convenient.
However, in such systems, if a server signs blank votes before users vote, it may cause
undue multi-voting. Furthermore, if users vote before the signing of the server, voting
information will be leaked to the server and may be compromised. Blind signatures
could be used to prevent leaking voting information from the server; however, malicious
users could produce non- candidate signatures for illegal usage at that time or in the
future. To overcome these problems, this paper proposes a novel oblivious signature
information protection, personal privacy, and message verification and to ensure that no
one can cheat other users (including the server). We propose an electronic voting
system based on the proposed oblivious and proxy signature scheme and implement
conveniently. Security analyses and performance comparisons are provided to show the
capability and efficiency of the proposed scheme. (Chiou, Wang, & Chen, 2017)
Computer scientists who have done work in, or are interested in, electronic voting
Internet voting does not meet the requirements for public elections
Voting on the Internet using every day PC's offers only weak security, but its
main disadvantages are in the areas of anonymity and protection against coercion
and/or vote selling. It's such a truly bad idea that there seems to be no credible
academic effort to deploy it at all. The Presidential elections of 2000 brought national
attention to problems with current American methods of casting and counting votes in
public elections. Most people believe that the current system should be changed; there
who have citizenship of Kenya and whose age is above 18 years of age and any sex
can give his\her vote online without going to any physical polling station. There is a
Commission of Kenya (IEBC) in which all the names of voters with complete information
is stored.
In “ONLINE VOTING SYSTEM” a voter can use his\her voting right online without
any difficulty. He\She has to be registered first for him/her to vote. Registration is mainly
done by the system administrator for security reasons. The system Administrator
registers the voters on a special site of the system visited by him only by simply filling a
registration form to register voter. Citizens seeking registration are expected to contact
the system administrator to submit their details. After the validity of them being citizens
of Kenya has been confirmed by the system administrator by comparing their details
submitted with those in existing databases such as those as the Registrar of Persons,
the citizen is then registered by the IEBC as a voter. After registration, the voter is
assigned a secret Username and Password with which he/she can use to log into the
system and enjoy services provided by the system such as voting, checking results
among others. If invalid/wrong details are submitted, then the citizen is registered to
The voting system that uses electronic devices to either aid or take care of
casting and counting votes is termed as e-voting system. The paper based voting
system is replaced by the e-voting. Now a days to decrease the load of man power and
delay in result declaration of voting result e-voting system is more in demand by private
or public organizations. It also saves papers which are made up of trees which will
Since 1960 e-voting systems are being used when the punched card system
appeared and was used on seven different counties in US for the presidential election of
1964 and nowadays it has become a very practical way of voting. Electronic voting has
many advantages over the traditional way of voting. Some of these advantages are
lesser cost, faster tabulation of results, greater accuracy, and lower risk of human and
Halgaonkar, 2019)
Database System
The paper focuses on security issues that are associated with the database
system thatare often used by many firms in their operations. The rapid development and
production. However, these developments have served to bring issues of security. Many
firms are falling victims of cyber crimes. These are malicious people who target their
data and compromise its integrity. This is occasioned by unauthorized access, which
makes data lose its integrity and lastly operations of the business are affected
negatively. This paper will tackle various issues in database security such as the goals
of the security measures, threats to database security and the process of database
practice patterns and patient outcomes as well as comparison with other participating
ICUs worldwide (via local and central database components). The Project IMPACT
website [part of the Society for Critical Care Medicine (SCCM) website] provides a
science and practice of critical care medicine which would utilize information stored in
the central Project IMPACT database. The database has been developed by the SCCM
to insure integrity of the database, restrict concurrent and conflicting access to data
issues in the performance analysis of concurrency control algorithms and their affect on
the overall database system performance. With many alternatives now available to
design to a particular environment and need. In this paper, we will discuss difficulties in
modeling concurrency control algorithms and describe how these difficulties have been
Business Data always growth from kilo byte, megabyte, giga byte, tera byte, peta
byte, and so far. There is no way to avoid this increasing rate of data till business still
running. Because of this issue, database tuning be critical part of a information system.
information systems are the single most reasons for system outage and unacceptable
performance. One way of addressing the challenge of total cost of ownership is by
database performance tuning. In this paper, we will explain the progress made thus far
on this important problem. Specifically, we will propose the architecture and Algorithm
Voting System
The people are given the right to vote freely and cast the votes according to their
beliefs. The main goal of mobile application voting system is to eliminate the long queue
in the precincts, paper ballots, vote interruption due to power lost, unsecured data
transfer, violence in actual voting area, and mass requirement of manpower for vote
the country. And that is, the registration of sim card per mobile user. Once a person
purchased a SIM (Subscriber Identity Module) card it will be registered using the
passport number. If the SIM card we used is registered per person then we can take
that advantage in many ways. Like avoid frauds, theft, and other crimes. Since the
major requirement to vote is the individual to be registered, the voters ID and the SIM
card will be the unique identifier for the registration to be able to vote on the mobile
application. Voter’s registration will be open on the designated dates set by the
to ensure that the person is still residing in the country and not deceased. Mobile voting
is through internet connection or data network. This technology will be efficient and
The Philippines is now moving towards automating the 2010 national election
through the use of Smartmatic Auditable Election System (SAES) which is a fully-
automated, electronic voting system. The Commission on Election (COMELEC) will use
what is called Precinct Count Optical Scan (PCOS) machines. The PCOS is a form of
Optical Mark Reader (OMR) machines that function by reading and counting the
markings made by voters on the ballots after the same are fed to the machines.
This will change how voting is done in the Philippines, but with only a few
months before its final implementation some of the political and government elites are
still apprehensive as to its claim of being “reliable and secure”. Even most of the voters
are increasingly used in elections across the world, particularly because they are often
and analysis of results, as well as potentially greater accuracy, has all added to the
attractiveness of computer-based voting equipment. There is little doubt that the ability
scenarios, where a prolonged period of counting can heighten tensions and reduce
confidence in the final results. The potential to remove some traditional elements of
unintentional voter error or intentional fraud can also contribute to greater confidence,
while at the same time being automated it also raises new questions as to its ability to
counteract the biggest problem in computers and internet today, that of hacking and
virus attacks.
In the past, manual voting process was used in the Philippines to cast people’s
votes by writing on a ballot the names of their preferred candidates from the national to
the local level and the ballot is subsequently dropped inside a steel container called a
ballot box. A local Board of Election Inspector (BEI) proceeds to manually count the
votes by reading the names of voted candidates on each ballot in the presence of the
candidates’ poll watchers on a tally sheet called an election return (ER) after the polls
closes.
the errors that may or may not be insignificant factors that may prove to be its undoing
This study bears particular significance to every Filipino, considering the travails
has yet to end. There are islands of Calypso, nine headed hydras, giant gaping maws
like traps. Our electoral process has been characterized by so much electoral fraud, to
so much abuse with the process that issues of legitimacy oftentimes places our
The Philippine Experience in so far as the electoral reforms are concerned may
be seen in different ways. One may look at it as a glass half full or a glass half empty.
Depending on one’s perception, the responses would also vary. If it is half empty then
we can feel it up with water and drink it or sometimes, we just simply drink and do away
Database
freshman students for the Admissions and Marketing Office of TIP Manila. This study
also aimed to create and develop a system capable of storing records of prospect
students, providing fast retrieval of prospect students’ records, and producing data that
are efficient in determining the market initiative scheme and evaluating the system in
The descriptive method of research was used in this study. The proponents
made a brief description of the problems identified in the existing system and at the
same time illustrated how the proposed system would reduce the problems identified.
Moreover, the developmental method was also used. This research was able to develop
observations and asked some questions, process descriptions from the system users.
This also focused on building a prototype and evaluating the program was developed.
roads based on multi-criteria evaluation. The proposed system can likewise be utilized
provided in the future. The advantage of SDSS is that it offers a structured approach
in integrating analytical modeling and database operations to make decision-making
more efficient, transparent, and equitable. The system allows planners to organize,
monitor, and visualize data that can be used to determine the necessary interventions
to meet local road network planning objectives, systematically and efficiently. (Castro
itself. Critical as it is to prepare for the future, for many local traditional companies,
starting with adopting existing technology solutions to solve operational issues may be a
more important first step. The study conducted attempts to identify a theme of current
issues facing companies through keyword analysis. 26 companies responded and were
willing to be profiled and their business processes were subjected through thematic
analysis. The results showed that many still operate in manual and traditional ways and
improve their capacity of quality management in the 4th Industrial Revolution. The result
of this study could be used for further researches into key technologies that Filipino
Knowledge
STANDARD SDLC
Requirements:
Student’s Web-
Voter’s Information Planning
based Voting
Candidate’s Information
Admin Information Analysis System for
Christian
Hardware Design
College of
Requirements:
Implementation Tanauan
Desktop Computer
Printer Maintenance
Intranet Connection
Software
Requirements:
PHP
XAMPP
MYSQL FEEDBACK
ONLINE
Figure 1 shows the input, process and output of the system. The knowledge
requirements of the system are Voter’s Information, Candidate’s Information and Admin
Information. The hardware requirements are Desktop Computer, Printer and Internet
Connection. The software requirements are PHP, XAMPP and MYSQL. The proponents
will use the standard system development life cycle (SDLC) for the process as the
methodology. The output will be Online Voting System for Christian College of Tanauan.
Operational Definition of Terms
position.
OPERATIONAL FRAMEWORK
Methodology
The purpose of this chapter is to discuss the research design, and methods used
in the study. The proponents used different tools to gathered information for the
development of the said software solution. Data gathering helps the researchers to
Research Methodology
This research follows the proper System Development Life Cycle. It has five
Each phase plays a vital role in the success of the development of the system.
During data gathering, the proponents observe how is the election process in the
elementary department, junior high school department, senior high school department,
and college department of Christian College of Tanauan. The proponents also interview
all the persons involve in the election process. During the process of observation and
interview the proponents noticed that Christian College of Tanauan conducts election
manually. With this kind of process some students didn’t take seriously the election of
the student officers, and most of the time the election process consumes so much time.
Analysis
system requirements; Admin module, Voter’s module and Teacher’s module for the
Voting System for Christian College of Tanauan. The admin module will be used by the
MIS staff. The voter’s module is intended for the student voters and the teachers’
Design
into a system designed document that accurately describes the design of the system
and can be used as an input to system development. In order to create the Student’s
Web-based Voting System for Christian College of Tanauan the proponents create 3
modules namely admin, voters and teachers module. In the admin module the admin
can manage information and elections. The admin can also create and facilitate the
elections. In the voters module the voters can cast votes and view results of the
elections. In the teachers module the teacher can view results of the elections
Implementation
The proponents will install the system in the server of the school and each
computer in the computer lab will access the system in the server through the use of
intranet. The college election and senior high school election will be done in the
computer laboratory 1 of the college department while the elementary and junior high
school election will be done in the junior high school computer laboratory.
Maintenance
The application will be tested during the operation. The target users will be
trained on how to use the system. Eventually, corrective and adaptive maintenance will
be done if the admin, voters and teachers will encounter innovation, new technology
START
Do you
want to
vote?
N
Y
Log on to Logbook
Cast Vote
Submit Vote
END
Figure 3 shows the flowchart of the existing system. The Christian College of
Tanauan uses a manual system for their election process. The students or the voters
will have to choose if they want to vote or not. If they want to vote they have to log on
the logbook and cast and submit their vote. If they not want to vote the process
automatically end.
ADMIN Server & Database Teachers
Intranet
Student Voters
Figure 4 shows the system architecture of the proposed system. The admin,
voters and teachers will access the system though intranet and goes directly to the
server and database. Admin will manage election, students will register to the system to
become a valid voter and teachers can only view the results of the election.
START
N
N N
Are you Are you a Are you a
an voter? teacher?
Admin?
Y Y Y
Facilitate Submit
Election Vote
END
Figure 5 shows the flowchart of the proposed system. The admin will have
to login in order to manage election and generate reports. The voters will have to login
in order to cast and submit their votes. The teachers can only view the results of every
elections.
Manage Voters
Manage Elections
Generate Reports
Figure 6 shows the use case for admin module. Through the use of the system
the admin can manage voters, manage elections and generate necessary reports.
Register
Cast Votes
Voters
View results
Figure 7 shows the use case for voter’s module. To become a voter the students’
needs to register. The voters can cast their votes and view the results of the elections.
Register
View results
Figure 8 shows the use case for teacher’s module. In order for teachers to view
the results of every elections they need to register and access the system.
Test Plan testing and training must be in place before construction can begin.
Test Specification
On this specific test phase the proponents specifies the purpose of the specific
test, identifies the required inputs and expected results. Proponents provides a step-by-
step procedures for executing the test and outlines the pass / fail criteria for determining
acceptance.
Test specification has to be done separately for each unit. Based on the
approach specified in the test plan, the feature to be tested on each unit must be
determined. The overall approach stated in the plan is refined into specific test
techniques that should be followed and into the criteria to be used for evaluation.
Unit Testing
On this specific test phase the proponents manually test all testable parts of the
system individually and independently scrutinized for proper operation. Proponents will
test if all the items in the documents are met in the system. Proponents will test if all the
functions are running smoothly and according to what is has be done. Proponents will
test each module to know if the module is doing what is required and indicated in the
documents.
System Testing
whole. The goal at this level is to evaluate whether the system has complied with all of
the outlined requirements and to see that it meets Quality Standards. Proponents will
test the system if it is performing the task as designed. The proponents will test if the
admin can create, manipulate and facilitate election of each department in Christian
College of Tanauan, admin will also check if the system can canvass and generate
election results. The proponents will test if the student can register as a voter and can
cast a vote. And lastly the proponents will test if the teachers can view results of
election.
Acceptance Testing
The final level, Acceptance testing (or User Acceptance Testing), is conducted
to determine whether the system is ready for release. The proponents will install the
system in the business office for the property custodian to check all the functionalities
and requirements are met by the proponents. The property custodian will check if the
Test Code
In test code, each module will be tested according to their functions. A test matrix
Test Case #: 1
Test Priority
High
(Low/Medium/High):
Module Name: Admin
Test Title: Test the Admin module
Description: Validation in the inputs and output
Validated
Pre-condition: inputs
Dependencies:
Expected Status
Step # Test Steps Test Data Actual Result Notes
Result (Pass/Fail)
Can add,
Manage
1 Voters edit, delete
Voter
voters
Manage Voters, Votes, Can create
2
Election candidates election
Can
Generate Voters, Votes,
3 Generate
Reports candidates
reports
Table 1 shows the test case for admin module. Admin will test if he can manage
Test Case #: 1
Test Priority
High
(Low/Medium/High):
Module Name: Voter
Test Title: Test the Voter’s module
Description: Validation in the inputs and output
Validated
Pre-condition: inputs
Dependencies:
Expected Status
Step # Test Steps Test Data Actual Result Notes
Result (Pass/Fail)
Username, Can login to
1 Register
Password the system
Can cast
2 Cast Votes votes
their votes
View Voters, Votes, Can view
3
Results candidates results
Table 2 shows the test case for voter’s module. Voters need to register in order
to access the system. If they are registered he can cast votes to the candidates they
Test Case #: 1
Test Priority
High
(Low/Medium/High):
Module Name: Teacher
Test Title: Test the Teacher’s module
Description: Validation in the inputs and output
Validated
Pre-condition: inputs
Dependencies:
Expected Status
Step # Test Steps Test Data Actual Result Notes
Result (Pass/Fail)
Username, Can login to
1 Register
Password the system
View Voters, Votes, Can view
2
Results Candidates results
Table 3 shows the test case for teacher’s module. The teacher needs to registers
in order to access the system and can view the results of the elections.
Operating Procedure
Operating procedures show the flow of the Admin, Voter’s, and Teacher’s module. It
will show how the system will operate thru the use of flowcharts.
Table 4. Admin Module Operating Procedure
required
the election
Evaluation plan
standard is divided into four parts which addresses, respectively, the following subjects:
quality model; external metrics; internal metrics; and quality in use metrics.
The ISO 9126-1 software quality model identifies 6 main quality characteristics.
Reliability
characteristic defines the capability of the system to maintain its service provision under
defined conditions for defined periods of time. One aspect of this characteristic is fault
tolerance that is the ability of a system to withstand component failure. For example if
the network goes down for 20 seconds then comes back the system should be able to
Usability
Usability only exists with regard to functionality and refers to the ease of use for a
given function. The ability to learn how to use a system (learnability) is also a major sub
characteristic of usability.
Efficiency
This characteristic is concerned with the system resources used when providing
the required functionality. The amount of disk space, memory, network etc. provides a
are overlaps
Maintainability
The ability to identify and fix a fault within a software component is what the
or complexity as well as modularization. Anything that helps with identifying the cause of
a fault and then fixing the fault is the concern of maintainability. Also the ability to verify
(or test) a system, i.e. testability, is one of the sub characteristics of maintainability.
Rating Equivalent
5 Strongly Agree
4 Agree
3 Neither
2 Disagree
1 Strongly disagree
Figure 7 shows the lickert scale which will be used in evaluating the system. It
has 5 ratings such as 5 – Strongly Agree, 4 – Agree, 3 – Neither, 2 – Disagree and 1 –
Strongly Disagree.
Ratings
Indicators
Criteria 5 4 3 2 1
Functionality The system performs the tasks required.
The system shows the result as expected.
9126 which is the most important standard for quality assurance. This standard
presents some set of quality attributes for any software such as Functionality, Reliability,