Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Ppt on online voting

89,087 views

Published on

This is done by our group to show a presentation of Online Voting Systing(OVS). Its line of thought are fully hypothetical

Published in: Education, Technology, Business
  • Login to see the comments

Ppt on online voting

  1. 1. ONLINE VOTING TEAM BADMAS GROUP Number 5 TEAM MEMBERS AVISHEK ACHARYYA ABHISHEK DASGUPTA BHASKAR MUKHERJEE DEBAPRIYO DASGUPTA MOLAY SAHA SANTANU SARMA SARKAR GUIDE Ms. MOUMITA DUTTA Ms. APARNA DUTTA Mr. SUDIPTO GIRI
  2. 2. INTRODUCTION <ul><li>  </li></ul><ul><li>Online Voting System(OVS) is a web based application. </li></ul><ul><li>OVS is a voting software. </li></ul><ul><li>It consists of four groups, namely – </li></ul><ul><ul><li>General voter. </li></ul></ul><ul><ul><li>Candidate/Nominee. </li></ul></ul><ul><ul><li>Inspector. </li></ul></ul><ul><ul><li>Administrator. </li></ul></ul>
  3. 3. SCOPE <ul><li>Secured login procedure </li></ul><ul><li>Knowing nominees of respective wards </li></ul><ul><li>Profiles can be modified </li></ul><ul><li>Nominees can post their vision </li></ul><ul><li>Casting vote is possible only with successful authentication of voter </li></ul><ul><li>Inspection is performed on both voter and nominee </li></ul><ul><li>Suspected user can be reported against. </li></ul><ul><li>Abused users can be verified and blocked if necessary </li></ul>
  4. 4. E-R Diagram VOTER NOMINEE ADMINISTRATO R INSPECTOR Address V_ID V_Name Address N_Name N_ID Address A_Name A_ID Address I_Name I_ID Cast Vote View profile Inspect Block Suggests Street City State Street City State Street city State Street City State
  5. 5. SYSTEM ARCHITECTURE
  6. 6. USER HEIERARCHY USE CASE DIAGRAM
  7. 7. VOTER USE CASE DIAGRAM
  8. 8. NOMINEE USE CASE DIAGRAM
  9. 9. INSPECTOR USE CASE DIAGRAM
  10. 10. ADMINISTRATOR USE CASE DIAGRAM
  11. 11. Sequence Diagrams of some of the processes are given below…
  12. 12. LOGIN PROCESS
  13. 13. VOTING PROCESS
  14. 14. VIEWING RESULT
  15. 15. REPORTING SUSPECTED USER
  16. 16. UPDATING RESULT
  17. 17. CHECKING SUSPECTED USER
  18. 18. BLOCKING USER PROCESS
  19. 19. TESTINGS PERFORMED <ul><li>System Test </li></ul><ul><li>Performance Test </li></ul><ul><li>Security Test </li></ul><ul><li>Automated Test </li></ul><ul><li>Stress and Volume Test </li></ul><ul><li>Recovery Test </li></ul><ul><li>Documentation Test </li></ul><ul><li>Beta Test </li></ul><ul><li>User Acceptance Test </li></ul>
  20. 20. Conclusion <ul><li>Security </li></ul><ul><li>24 x 7 Availability </li></ul><ul><li>Better Component Design </li></ul><ul><li>Flexible Architecture </li></ul>
  21. 21. Thank you…

×